... information Tampering with data Information disclosure Elevation of privileges User information Information disclosure Elevation of privileges Order information Tampering with data Information ... threatened by an attack. Product information in the database; user information in the database; order information in the database; communication of private information between user and server ... programs. ! Data. Includes data that is created during Web application execution, data that is stored online, and data that is archived offline, along with backup data, audit logs, databases,...