Most of the vulnerabilities identified in Chapter 3 could have been simply avoided by not allowing them to occur in the first place. The best way to avoid creating vulnerabilities in web applications is to plan and build security as part of the development cycle.
Keywords
- Threat Modelling
- Security Vulnerability
- Business Requirement
- Input Validation
- Secure Code
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.