4 - Vulnerabilities and Security Considerations


THIS PAGE IS STILL BEING DEVELOPED ... check back soon

Table of Contents

Vulnerabilities

OWASP Top 10 Software Vulnerabilities - OWASP Top Ten

Injection Attack

What is Injection?
- Link
- Link 2

How do we try and minimize the risk?

Parameterization

How do parameters protect the database?

How do we use parameters in SQL?

Data Encryption

Why do we need to encrypt some of our data?

How do we encrypt passwords and other data?