Document 2 (6)
Document 2 (6)
flexible as security rules are defined statically, Easier to manage and update without
changing source code,
Exception Management:
Safe APIs:
• Designing and using secure APIs: Application Programming Interfaces (APIs) enable
interaction between different software components. Safe APIs focus on designing and
using APIs that are secure and resilient against attacks, ensuring data integrity and
protecting against unauthorized access.
Best practices for safe API development include:
2. Input Validation: Validating and sanitizing API input parameters to prevent security
Type Safety:
• Importance of type safety in secure coding: Type safety refers to ensuring that variables
and data structures are used in a manner consistent with their declared types. It helps
prevent type-relatedvulnerabilities and can mitigate security risks associated with
incorrect data handling.
1. Strong Typing: Using programming languages with strong type systems that enforce type
constraints at compile-time.
2. Input Validation and Sanitization: Validating and sanitizing user inputs to prevent
unexpected or malicious data types from causingsecurity vulnerabilities.Common attacks
identified using sql injection.command injection , XSS crosssite scripting
Memory Management:
1. Bounds Checking: Ensuring that memory operations stay within allocated memory
regions to prevent buffer overflows.
Mitigation Strategies:
6) Security misconfiguration:
Mitigation Strategies:
Mitigation Strategies:
Mitigation Strategies: