During a recent log review, an analyst discovers evidence of successful injection attacks. Which of the following will best address this issue?
Input validation (D)is the most effective way to preventinjection attacks, such asSQL injection, XSS, etc. It ensures that only correctly formatted and expected inputs are processed by the application.
This is clearly identified underDomain 2.3: Application security techniques, whereinput validationis listed as aprimary defense against injection attacks.
Tandra
3 days agoYesenia
8 days agoErin
13 days agoFelix
18 days agoHelaine
24 days agoJohana
29 days agoRosenda
1 month ago