Week 3 Securing Software
Phishing. Code Injection. Cross-Site Scriping (XSS): Reflected; Stored. Character Escapes. SQL Injection. Prepared Statements. Command Injection. system
. eval
. Developer Tools. Client-Side Validation. Server-Side Validation. Cross-Site Request Forgery (CSRF). GET. POST. Open Worldwide Application Security Project (OWASP). Arbitrary Code Execution (ACE). Remote Code Execution (RCE). Buffer Overflow. Stack Overflow. Cracking. Reverse Engineering. Malware Analysis. Open-Source Software. Closed-Source Software. App Stores. Package Managers. Operating Systems. Bug Bounty. Common Vulnerabilities and Exposures (CVE). Common Vulnerability Scoring System (CVSS). Exploit Prediction Scoring System (EPSS). Known Exploited Vulnerabilities Catalog (KEV).
- Lecture
- Assignment 3