You are on page 1of 2

https://www.makeuseof.

com/prevent-frontend-security-risks/

Here is a table summarizing some of the most common front-end security risks and their fixes:

Security Risk Description Fix

Use input validation and


Cross-Site Scripting Attackers inject malicious scripts sanitization to prevent user input
(XSS) into a trusted website. from being interpreted as code.

Attackers trick users into


performing actions on a website Use anti-CSRF tokens to ensure
Cross-Site Request without their knowledge or that requests are coming from the
Forgery (CSRF) consent. expected source.

Attackers exploit vulnerabilities Use strong passwords, multi-factor


Broken Authentication in authentication and session authentication, and session timeouts
and Session Management management mechanisms. to prevent unauthorized access.

Attackers manipulate URLs to Use indirect object references or


Insecure Direct Object access resources that should be access controls to prevent
References protected. unauthorized access.

Attackers exploit vulnerabilities Keep software up-to-date, remove


Security in web servers, frameworks, and unnecessary features, and use
Misconfiguration applications. secure configurations.

Please note that this is not an exhaustive list of front-end security risks and their fixes.

Front End performance improvements


No. Tip

1 Use efficient change detection strategies

2 Use web workers to ensure non-blocking user interface

3 Optimize events, DOM manipulation, and DOM trees for faster and smoother rendering

4 Implement code-splitting and lazy loading for faster load time

5 Save your build from memory leak and remove unused code using tree-shaking

6 Use smaller variable scopes and make use of Lodash

7 Debounce ng-model and use track by with ng-repeat

You might also like