5.1 Answer
The new features can be used to extend the Cross site request forgery a method for attackers to reveal confidential information from servers. The method can be considered working as a broker communicating on different fronts (Roy et al 1999). When users are interacting with servers they are sending http requests to access information from servers, once the server receives the request is send out a response giving back information(Gollmann, D. 2011). An attacker can intentionally set up a …show more content…
The answer has a simplified explanation on http requests and response. The answer is well structured and well formulated for any target group to comprehend the complex connections from an attacker's purpose and the vulnerabilities can be to their advantage. The answer is critically evaluated and reviewing the source of Dieters literature and Roy et al(1999). The answer would lower if Cross site request forgery wasn’t shortly explained and what advantages it has for intruders.
An C answer for this question is one that language, style and the answers structure are somehow adapted to the questions purpose, recipient and the communication situation, and uses rhetorical techniques. But does not use referral techniques to strengthen the answers.
An E answer for this question would be where language, style and the answers structure is not adapted to the questions purpose. And the answer would be short and not explaining essential words for effective overview for understanding.
5.3