09/07/17 10:44 am

Identifying Critical Software Security Flaws – Part 3

This series of articles is focused on application layer vulnerability because it can be exploited to compromise the confidentiality, integrity or availability of resources used by the application and its users. This layer may be difficult to protect so it is important to understand how it could be compromised. It is also very accessible to cyber criminals, so the best way to make the application layer secure is to ensure you develop secure applications.