• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Summary

Web-based email has a lot of advantages, but special care must be taken to make sure email attackers don't take advantage of unsuspecting users. This chapter has described some measures users and developers can take to ensure a safer environment.

Row-based security relies on users accessing the system as it was written and doesn't offer real security. In addition, two injection techniques are often used on Web-based email applications: cross-site scripting and SQL injection. Both attacks can cause a lot of damage and are especially prevalent in Web applications.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint