11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

14Building Secure Data AccessIn this Chapter●●●●●OverviewPreventing SQL injection attacksEncrypting data in the databaseSecuring data over the networkSecuring database connection stringsH<strong>and</strong>ling data access exceptionsThe database is a prime target for application level attacks. <strong>Application</strong> levelattacks are used to exploit vulnerabilities in your data access code to gain access tothe database. If all other attack vectors are closed, then the application’s front door,port 80, becomes the path of choice for an attacker to steal, manipulate, <strong>and</strong>destroy data.This chapter shows you how to build secure data access code <strong>and</strong> avoid commonvulnerabilities <strong>and</strong> pitfalls. The chapter presents a series of countermeasures <strong>and</strong>defensive techniques that you can use in your data access code to mitigate the topthreats related to data access.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!