Application & Web Security
In this chapter, we will:
- List the characteristics that make an application secure.
- Learn more guidelines on secure design and development of applications.
- Explain the vulnerabilities of web browsers, web servers, and web applications, and discover the controls that should be used to eliminate these vulnerabilities.
- Focus on web application attacks, including buffer overflow attacks, SQL injection attacks, command injection attacks, cross-site scripting attacks, cookie poisoning attacks, and session hijacking attacks.