Our text discusses SQL injection attacks. Consider a NoSQL database, is it still vulnerable to an SQL injection attack? Why or why not? What are the vulnerabilities associated with a NoSQL database?

You must include at least one scholarly citation. This is not a “book report”, so please use your citation to underpin your understanding of the subject matter but do not simply summarize your source.