Using Figure 5.4 as the target architecture, who are thethreat agents who will be most interested in attacking Web applications createdthrough AppMaker?
Discussion:
Since weknow that this particular instance of the AppMaker implements a customer-facingstore that processes financial transactions, how does that influence whichthreat agents may be interested in attacking it?