How to Build Preventative Countermeasures for Web Application Vulnerabilities

  • Ron Lepofsky


Most of the vulnerabilities identified in Chapter 3 could have been simply avoided by not allowing them to occur in the first place. The best way to avoid creating vulnerabilities in web applications is to plan and build security as part of the development cycle.


Threat Modelling Security Vulnerability Business Requirement Input Validation Secure Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Ron Lepofsky 2014

Authors and Affiliations

  • Ron Lepofsky
    • 1
  1. 1.OntarioCanada

Personalised recommendations