Read Time:19 Second
Description
The software does not record, or improperly records, security-relevant information that leads to an incorrect decision or hampers later analysis.
This can be resultant, e.g. a buffer overflow might trigger a crash before the product can log the event.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Non-Repudiation: Hide Activities