SQL Injection

Home/Tag:SQL Injection

Assessing & Mitigating Vulnerabilities of Web Systems

2020-07-15T13:06:11+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Web Systems Web Servers are the programs that are used for hosting websites. Web servers may be deployed on a separate web server hardware or installed on a host as a program. One of the most important aspects of cyber security is the ability to secure web systems. This [...]

Vulnerability Assessment & Mitigating Vulnerabilities of Security Architectures- Part I

2020-07-15T14:06:35+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Vulnerability Assessment & Mitigating Vulnerabilities of Security Architectures- Part I One of the most important topics in CISSP course is vulnerability assessment. In this section, we discuss the techniques used to identify and fix vulnerabilities in systems. Server-Client based systems We begin the discussion of vulnerability assessment by talking about various aspects of Server-Client [...]

Go to Top