Introduction
Keeping secure in Java
()
What you should know
()
1. Preventing Injection Attacks
Injection attacks
()
Prevent SQL injection
()
Other injection attacks
()
Challenge: Refactor Java code susceptible to injection attacks
()
Solution: Refactor Java code susceptible to injection attacks
()
2. Protecting Sensitive Data
Challenge: Prevent sensitive data leaks
()
Sensitive data leak
()
Log message leaks
()
Exception leaks
()
Solution: Prevent sensitive data leaks
()
3. Resolving Access Vulnerabilities
Class and package accessibility
()
Mutability
()
Extensibility
()
4. Additional Vulnerability Remediation
Build vulnerabilities
()
Input validation
()
Serialization
()
Ex_Files_Secure_Coding_in_Java.zip
(49 KB)