Project Architecture Network Network security

Source: Internet
Author: User

Data security has become a standard for system considerations, and system security generally includes the following points:

1, the XSS Dom vulnerability, this vulnerability can make some data loss of users, when using careful attention to filter some special characters;

2, SQL injection attacks, the vulnerability is mainly through the writing of some combination of SQL script statements resulting in the way that the front and back to filter special characters, while minimizing the use of SQL stitching statements;

3, Code Preparation planning: This is related to personal habits, for example:

Business scenario: Log in to student system, query the student part information according to student name, then query student's details through student ID;

There is a problem: the design of this query may reveal information about all users, because the student's ID is self-increasing, and if I traverse all ID fields, the mock query will cause the learning information to be leaked.

Business Summary: So when doing the query, should consider good data security design, do not very easy to follow the wayward operation;

4. Server Deployment:

Some enterprises will deploy the file server to the intranet, the external network server and the file server is the local area network, then the user accesses the external network server obtains the file the process can become:

User Request-----> Extranet Server---> File server to display the file read and write to the user;

The advantages of this is also obvious: the timely external Network service is attacked, the file server is not affected, the file server is not lost, so the deployment is very secure;

Then the interaction between the extranet server and the file server is as follows:

1> most of the methods used in the data stream;

2> Of course also now convert the file into binary, two-level conversion Base64 string, string display to the extranet service, the external Network Service portfolio into a binary stream presented to the user;

Project Architecture Network Network security

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.