Question: There are two important security risks that should be addressed in web - based systems that involve accessing a database to validate information provided by
There are two important security risks that should be addressed in webbased systems that involve accessing a database to validate information provided by a user, like the one you developed in the assignments.
Explain what these two security risks are, and describe how you protect your web application from this type of attack.An important question to ask yourself now is why do we need database validation and all the other validation. The answer is that database validation is the last line of defence. If someone accidentally disables the serverside validation because they assume the clientside validation is all that is needed, we might find data entering our database from malicious sources that know how to disable the clientside validation. There is no circumventing the rules placed on the database without actually altering the database structure.
Another scenario where we want to ensure that the database validates the data is for applications that might have multiple different interfaces to the underlying data eg a webbased interface and a mobile interface If these are developed independently, the development teams may not have the same dedication to ensuring valid data as you have. By enforcing data validity in the database, we can be certain that our data is always of high quality.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
