During a recent log review, an analyst discovers evidence of successful injection attacks. Which of the following will best address this issue?
Input validation (D)is the most effective way to preventinjection attacks, such asSQL injection, XSS, etc. It ensures that only correctly formatted and expected inputs are processed by the application.
This is clearly identified underDomain 2.3: Application security techniques, whereinput validationis listed as aprimary defense against injection attacks.
Currently there are no comments in this discussion, be the first to comment!