Data security has become a standard for system considerations, and system security generally includes the following points:
1, the XSS Dom vulnerability, this vulnerability can make some data loss of users, when using careful attention to filter some special characters;
2, SQL injection attacks, the vulnerability is mainly through the writing of some combination of SQL script statements resulting in the way that the front and back to filter special characters, while minimizing the use of SQL stitching statements;
3, Code Preparation planning: This is related to personal habits, for example:
Business scenario: Log in to student system, query the student part information according to student name, then query student's details through student ID;
There is a problem: the design of this query may reveal information about all users, because the student's ID is self-increasing, and if I traverse all ID fields, the mock query will cause the learning information to be leaked.
Business Summary: So when doing the query, should consider good data security design, do not very easy to follow the wayward operation;
4. Server Deployment:
Some enterprises will deploy the file server to the intranet, the external network server and the file server is the local area network, then the user accesses the external network server obtains the file the process can become:
User Request-----> Extranet Server---> File server to display the file read and write to the user;
The advantages of this is also obvious: the timely external Network service is attacked, the file server is not affected, the file server is not lost, so the deployment is very secure;
Then the interaction between the extranet server and the file server is as follows:
1> most of the methods used in the data stream;
2> Of course also now convert the file into binary, two-level conversion Base64 string, string display to the extranet service, the external Network Service portfolio into a binary stream presented to the user;
Project Architecture Network Network security