Level: Intermediate to Advanced
Software today is subjected to numerous attack vectors. The Internet world is a hostile world. Your apps must anticipate encountering digital terrorists who want to use your applications to get inside our organization. In this session, you'll learn about some of the most common attack vectors for applications and what you can do about them. You'll discuss techniques for protecting from user input including injection and cross site scripting attacks.
You will learn:
- How to dispel myths about hacking and application vulnerability
- How to identify common threat vectors for applications
- How to discover strategies for addressing common threat vectors