What is Un-validated Input?
Input received by program from untrusted source is a potential target for attack.
Possible threats of Unvalidated Input?
**– Buffer Overflows **- input that has been designed to overwrite program execution space
**– Cross Site Scripting ** input that contains scripts to be executed on other user’s browsers
– Command Injection - input that is modified to contain executable commands
How to validate all inputs?
What is Stack?
– Memory is allocated for automatic (local) variables within functions its used for temporary storage of information.
– Last In First Out (LIFO)
What is Heap?
– Memory allocated in the heap remains in existence for the duration of a program. It is used for dynamic memory allocation
What is Stack and Heap?
– Memory space for objects is always allocated in heap. Variables are placed on stack.
Benefits of threat modelling
Security Principles
Purpose of threat modelling