First, we'll take a look at the most common threats, a list of available resources, and what other tools are available. Then, we'll take each major threat related to security and go over what they are, examples of what they look like in code, syntax correction to fix the issue, and a list of best practices around the security risk. With this approach, we'll cover cross-site scripting, cross-site forgery, sensitive data issues, service site injection, and obfuscation.
- Risks posed by cross-site scripting
- Best practices for dealing with cross-site forgery threats
- Dealing with sensitive data risks
- Preventing server-side injection
- Preventing obfuscation