From the course: CSSLP Cert Prep: 4 Secure Software Implementation

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Inputs and outputs

Inputs and outputs

From the course: CSSLP Cert Prep: 4 Secure Software Implementation

Start my 1-month free trial

Inputs and outputs

- [Instructor] Attackers often use input fields to introduce malicious content into your apps. It's that ability for an attacker to interact with your app that makes it possible for them to launch some fairly damaging attacks in the first place. That's why learning how to securely manage user input and output is so important. Input validation may be one of the most significant, most effective security controls that you can build into your app. The number of potential risks that can be mitigated by this control alone is staggering. When you perform input validation, you instruct the app to perform a series of checks on any user supply data before passing that data to any back-end systems. These checks are designed to root out anything in the data that might present a risk to the app or the app infrastructure. During my pen test days, I found an app one of our customers was using that checked the health of the app…

Contents