Securing the Web

5. Securing the Web#

Syllabus Points Covered
Secure software architecture
Developing secure code
  • Apply security features incorporated into software including data protection, security, privacy and regulatory compliance

    • encryption

    • input validation

    • secure defaults

  • Design, develop and implement code using defensive data input handling practices, including input validation, sanitisation and error handling

  • Design, develop and implement a safe application programming interface (API) to minimise software vulnerabilities

    • safe endpoints

    • request validation

    • authentication and authorisation

    • least privilege

    • rate limiting

    • data exposure

    • safe error responses

    • HTTPS for APIs

  • Design, develop and implement code considering efficient execution for the user

    • memory management

    • exception management

  • Design, develop and implement secure code to minimise vulnerabilities in user action controls

    • broken authentication and session management

    • cross-site scripting (XSS) and cross-site request forgery (CSRF)

    • invalid forwarding and redirecting

    • race conditions

  • Design, develop and implement secure code to protect user file and hardware vulnerabilities from file attacks and side channel attacks

    • file attacks

    • side channel attacks

Programming for the web
Data transmission using the web
  • Investigate and describe the function of web protocols and their ports

    • HTTPS

Chapter Contents