Application security is the use of software, hardware, and procedural methods to protect applications from external threats.

Input Validation Tampering | A input validation is the outer defensive perimeter for a application. This perimeter protects the logic, processing and output generation. Examples of input validation tampering are cross-site scripting; SQL injection; canonicalization |
Software Tampering | This is when someone modifies the runtime behavior to perform unauthorized actions. |
No comments:
Post a Comment