The security logs of the software web application show patterns that are typical of an SQL injection attack. This is evidenced by the inclusion of SQL syntax in the user input fields in an attempt to manipulate the database. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Threats