课程: Programming Foundations: Web Security

今天就学习课程吧!

今天就开通帐号,24,600 门业界名师课程任您挑!

Map exposure points and data passageways

Map exposure points and data passageways

- Our final general security principle is to map your exposure points and data passageways. Remember the fundamental security equation from the beginning of this chapter? It was awareness + adequate protection = security. Mapping data movement and exposure increases awareness of vulnerabilities. Once we're aware of them, then we can protect them. You can't secure a door if you don't know it exists. Mapping helps to define the attack surface. The attack surface is made up of all points that are accessible to an attacker. It's where they could get data in or get data out. If you were mapping exposure points of a castle, the attack surface might be made up of walls, doorways, gates, bridges, and tunnels. You can think of your map as a security checklist. You may decide to create a list in a word processor or to draw diagrams on paper showing the paths that data takes. You should take inventory of where data enters your…

内容