2.1 Security Flashcards
What is a key principle for data protection?
Encrypt in transit and at rest.
This ensures that sensitive data is protected during transmission and while stored.
What should be done to prevent XSS and SQL injection?
Sanitize all user inputs or any input parameters exposed to user.
This involves cleaning and validating data received from users to eliminate harmful code.
What technique should be used to prevent SQL injection?
Use parameterized queries.
This method ensures that user input is treated as data, not executable code.
What is the principle of least privilege?
Users should have the minimum level of access necessary to perform their tasks.
This reduces the risk of unauthorized access to sensitive information.
What is a recommended source for further reading on security?
API security checklist.
This resource provides guidelines for securing APIs against common vulnerabilities.
What is another recommended source for developers regarding security?
Security guide for developers.
This guide offers best practices for integrating security into the development process.
What list is crucial for understanding web application security threats?
OWASP top ten.
This list outlines the most critical security risks to web applications.