Secure Application Concepts

  • Stored procedure: Sealed script as the best way to prevent SQL injection attacks.
  • Input validation: Controls input, prevents SQL injection, buffer and integer overflow attacks.
  • Baseline: List of applications before and after to see changes. Only method to detect zero-day attacks.
  • Obfuscation: Masks or obscures code.
  • Steganography: Hides data inside other data.
  • Sandboxing: Isolates applications for testing and patching if they are dangerous.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset