课程: Programming Foundations: Web Security
今天就学习课程吧!
今天就开通帐号,24,600 门业界名师课程任您挑!
Map exposure points and data passageways
- Our final general security principle is to map your exposure points and data passageways. Remember the fundamental security equation from the beginning of this chapter? It was awareness + adequate protection = security. Mapping data movement and exposure increases awareness of vulnerabilities. Once we're aware of them, then we can protect them. You can't secure a door if you don't know it exists. Mapping helps to define the attack surface. The attack surface is made up of all points that are accessible to an attacker. It's where they could get data in or get data out. If you were mapping exposure points of a castle, the attack surface might be made up of walls, doorways, gates, bridges, and tunnels. You can think of your map as a security checklist. You may decide to create a list in a word processor or to draw diagrams on paper showing the paths that data takes. You should take inventory of where data enters your…
内容
-
-
-
-
Least privilege3 分钟 33 秒
-
(已锁定)
Simple is more secure2 分钟 40 秒
-
(已锁定)
Never trust users3 分钟 7 秒
-
(已锁定)
Expect the unexpected2 分钟 10 秒
-
(已锁定)
Defense in depth3 分钟 23 秒
-
(已锁定)
Resilience4 分钟 31 秒
-
(已锁定)
Security through obscurity3 分钟 56 秒
-
(已锁定)
Deny-listing and allow-listing3 分钟 3 秒
-
(已锁定)
Map exposure points and data passageways3 分钟 34 秒
-
-
-
-