Introduction
Keeping secure in Java
()
What you should know
()
1. Preventing Injection Attacks
Injection attacks
()
Prevent SQL injection
()
Other injection attacks
()
Challenge: Refactor Java code susceptible to injection attacks
()
Solution: Refactor Java code susceptible to injection attacks
()
2. Protecting Sensitive Data
Sensitive data leak
()
Log message leaks
()
Exception leaks
()
Challenge: Prevent sensitive data leaks
()
Solution: Prevent sensitive data leaks
()
3. Resolving Access Vulnerabilities
Class and package accessibility
()
Mutability
()
Extensibility
()
4. Additional Vulnerability Remediation
Build vulnerabilities
()
Input validation
()
Serialization
()
Ex_Files_Secure_Coding_in_Java.zip
(49 KB)