Application & Web Security

In this chapter, we will:

  1. List the characteristics that make an application secure.
  2. Learn more guidelines on secure design and development of applications.
  3. Explain the vulnerabilities of web browsers, web servers, and web applications, and discover the controls that should be used to eliminate these vulnerabilities.
  4. Focus on web application attacks, including buffer overflow attacks, SQL injection attacks, command injection attacks, cross-site scripting attacks, cookie poisoning attacks, and session hijacking attacks.