1. Rights Management
Comprehensive data security verification and management from modules, forms, data audits, function buttons.
2. IP Authentication
Data interface access for IP checksum
3, login, operation log, program security log
All users of the system log in and operate all of the log records.
The Program Security log action allows you to see the [loghelper Logging Help class ] I wrote earlier.
4. SQL injection Check filtering
A, form control JS front-end Check, special character filter
B. Filter sensitive characters using Global.asax's Application_BeginRequest event.
C. Request filtering
Special character filtering to see I've previously written [ filter sensitive characters using Global.asax's Application_BeginRequest event ].
5. Verification specification
A, front-end JS code verification
B, Back-end program code validation
C, database constraints
6. Dynamic Verification Code
A, email dynamic verification code verification
b, SMS dynamic Verification Code verification
7. Verification Code
Login, registration or related forms take input verification code to avoid malicious attacks
Web Development Performance Optimization---security chapter