Five application security threats and how to counter them

New threats emerge every day. In order to be secure, you must be able to identify the major threats and understand how to counter them. Here is a guide to the five most common and insidious threats to applications -– and what you can do about them.

New security threats emerge every day. In order to be secure, you must be able to identify the major threats and understand how to counter them. Here is a guide to the five most common and insidious threats to application security –- and what you can do about them. The following links and articles will provide you with crucial information on application exploits and countermeasures. Are there other topics you'd like to see learning...

guides on? Send me an e-mail and let me know what they are. -- Jennette Mullaney, Assistant Editor.

Threats

SQL Injection

Cross-Site Scripting Attacks

Denial of Service

Buffer Overflows

Session Hijacking

More Useful Resources


Expert advice on Web application threats

Do you have a question about Web application threats that you're having trouble getting answered? SearchAppSecurity.com expert Jeremiah Grossman can help. Read advice he has given or submit your own questions.

Send in your suggestions
Are there other topics you'd like to see learning guides on? Send SearchAppSecurity.com's editors an e-mail at editor@searchappsecurity.com and let them know what they are.

This was first published in June 2006

Dig deeper on Internet Application Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close