Response
The response to business logic abuse can be quite challenging for two reasons. First, detecting business logic abuse is difficult. The perpetrators using the same functionality used by legitimate users and therefore, their traffic is likely intermingled with real traffic. This can make the identification of these types of exploits problematic.
Second, since the criminal is using a legitimate flow on a website or other application, disabling that flow would result in a very poor experience for the website’s users. Finding an approach where legitimate users can access the business flow while limiting access to the bad actor is an especially tricky endeavor.
Read more about this topic: Business Logic Abuse
Famous quotes containing the word response:
“Tears are sometimes an inappropriate response to death. When a life has been lived completely honestly, completely successfully, or just completely, the correct response to deaths perfect punctuation mark is a smile.”
—Julie Burchill (b. 1960)
“It does me good to write a letter which is not a response to a demand, a gratuitous letter, so to speak, which has accumulated in me like the waters of a reservoir.”
—Henry Miller (18911980)
“The reason can give nothing at all Like the response to desire.”
—Wallace Stevens (18791955)