There are literally thousands of Web-related vulnerabilities and you'd go crazy and spend an awful lot of money...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
trying to rid your Web-based systems of every little flaw. The biggest issues I see are cross-site scripting, authentication mechanism weaknesses, and application logic vulnerabilities. If you focused just on those three things you'd easily eliminate 90+ percent of your Web vulnerabilities.
In the case of software security, your best offense is a strong offense and an equally strong defense. Identifying issues before an application is launched is your best bet when offering up a stable online app. If you look below you will see I have collected a battery of Web 2.0 and application security tips and articles. These should prove invaluable to you and anyone else concerned with Web security.
- Free Web proxy security tools software testers should get to know
Learn which free Web proxy tools work best and how to use ones like, BurpProxy, Paros Proxy and WebScarab to boost rich Internet applications' security.
- How to get management on board with Web 2.0 security issues
Ways to get management buy-in for Web 2.0 security testing and quality assurance and to bolster application security before deployment are given in this tip.
- How to make your software tamperproof
Learn ways to tamperproof and secure your software app from this chapter of the book, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection.
Dig Deeper on Software Security Test Best Practices
Related Q&A from Kevin Beaver
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics.continue reading
How do self-healing networks function? Expert Kevin Beaver looks at the benefits such a network has to offer, as well as the key concepts ...continue reading
While there are numerous security benefits to a DNSSEC implementation, there are drawbacks as well. Expert Kevin Beaver explains.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.