Five application security threats and how to counter them

A guide to the five most common and insidious threats to applications - and what you can do about them.


Jennette Mullaney, Assistant EditorNew security threats emerge every day. In order to be secure, you must be able to identify the major threats and understand how to counter them. Here is a guide to the five most common and insidious threats to application security –- and what you can do about them.

The following links and articles will provide you with crucial information on application exploits and countermeasures.

Are there other topics you'd like to see learning guides on? Send me an e-mail and let me know what they are.
-- Jennette Mullaney, Assistant Editor.

TABLE OF CONTENTS
   Threats

  1. SQL injection
  2. Cross-Site Scripting Attacks
  3. Denial of Service
  4. Buffer Overflows
  5. Session Hijacking

   More Helpful Resources

  Threats



    1. SQL Injection
      (Return to Table of Contents)

      • SQL injection -- Whatis definition
      • Preventing SQL Injection attacks
      • Defense tactics for SQL injection attacks
      • SQL injection: Developers fight back
      • SQL Injection: Are your Web applications vulnerable? (PDF)
      • Automated SQL injection: What your enterprise needs to know -- Part 1
      • Automated SQL injection: What your enterprise needs to know -- Part 2
      • Blind SQL injection: Are your Web apps vulnerable? (PDF)
      • Free tool helps find SQL injection vulnerabilities
      • Raising risk prospects with a new SQL injection threat
      • OWASP Guide to Building Secure Web Applications and Web Services, Chapter 13: Interpreter Injection

    1. Cross-Site Scripting Attacks
      (Return to Table of Contents)

    1. Denial of Service
      (Return to Table of Contents)

    1. Buffer Overflows
      (Return to Table of Contents)

  1. Session Hijacking
    (Return to Table of Contents)

  More Useful Resources

[Return to Table of Contents]

Jeremiah GrossmanExpert advice on Web application threats

Do you have a question about Web application threats that you're having trouble getting answered? SearchAppSecurity.com expert Jeremiah Grossman can help. Read advice he has given or submit your own questions.


Send in your suggestions
Are there other topics you'd like to see learning guides on? Send SearchAppSecurity.com's editors an e-mail at [email protected] and let them know what they are.

Read more on Hackers and cybercrime prevention

SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close