There are literally thousands of Web-related vulnerabilities and you'd go crazy and spend an awful lot of money...
trying to rid your Web-based systems of every little flaw. The biggest issues I see are cross-site scripting, authentication mechanism weaknesses, and application logic vulnerabilities. If you focused just on those three things you'd easily eliminate 90+ percent of your Web vulnerabilities.
In the case of software security, your best offense is a strong offense and an equally strong defense. Identifying issues before an application is launched is your best bet when offering up a stable online app. If you look below you will see I have collected a battery of Web 2.0 and application security tips and articles. These should prove invaluable to you and anyone else concerned with Web security.
- Free Web proxy security tools software testers should get to know
Learn which free Web proxy tools work best and how to use ones like, BurpProxy, Paros Proxy and WebScarab to boost rich Internet applications' security.
- How to get management on board with Web 2.0 security issues
Ways to get management buy-in for Web 2.0 security testing and quality assurance and to bolster application security before deployment are given in this tip.
- How to make your software tamperproof
Learn ways to tamperproof and secure your software app from this chapter of the book, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection.
Related Q&A from Kevin Beaver
The Border Router Security Tool aims to improve router security to boost Internet safety. Expert Kevin Beaver explains its place in the enterprise.continue reading
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positivescontinue reading
Attackers are targeting the SSDP protocol to amplify the effects of DDoS attacks. Learn what this protocol does and how to secure it.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.