You are on page 1of 1

Input Validation Attacks: It is one of the very easy to implement attack.

It insets malicious scripts into a n application and by running such application the system can be attacked and it becomes vulnerable. It is even hard to defend than passive attacks. Following are some of the best countermeasures against input validation attacks: Application should be subjected to every possible future situation that can enco unter by security perspective Programmers are supposed to understand the importance of giving attention to sec urity aspects,while they develop the application. Adopting a protective approach is best in practice. It is more affective, cheape r, easier and faster tool to look for and remove any loopholes in input validati on in the stages of development. Keeping your program very simple helps you to test it against loopholes and inpu t validation vulnerabilities. Restricted user and file access should be implemented in all kinds of applicatio n environments. There should be proper separation between trusted and untrusted data.Trusted dat a should never be allowed spill over the understand memory spaces. Keep in mind that any applications should not be allowed to other access trusted applications. Most common buffer overflow attacks can be avoided by applying above measures.Bu ffer overflow are one of the lethal weapon for hackers and it is a widely used t ype of net attacks. If you spill out special characters like quotation marks, slash, semicolon, back slash etc., from user input , URL parameters and cookies it will make it harder for attacker to implement such attack ans also SQL injection attacks.

You might also like