Why would an attacker target my site?
Some Security Recommendations:
Awareness + Protection = Security
assume nothing; trust no one
A selection of attack types
Securing against HTML injection / XSS / SQL injection
Securing against SQL injection specifically
Client-Side Validation vs. Sever-Side Validation
+ what is used respectively
Client-Side Validation
Two ways:
Server-Side Validation
definition and characterstics of SSL and TLS
asymmetric cryptographic protocols designed for secure communication over a computer network.
explain the SSL or TLS handshake
between an SSL client and SSL sever

list 3 types of certificates
Domain Validation (DV) - Certificate Authority (CA) checks only the domain name.
Organisation Validation (OV) - CA checks domain and vets some information about organisation.
Extended Validation (EV) - CA checks domain and conducts thorough vetting of multiple aspects of the organisation, according to strict guidelines.
How are the HTTP POST and GET methods related to security?
In forms,
HTTP POST requests supply additional data from the client (browser) to the server in the message body.
GET requests holds all data in URL, which is much less secure.
What might different error messages in browsers reveal to attackers?
error 403 shows that the source exist and but is forbidden
this information can be useful for attackers
How can the page source be used for an attack?
the page source of websites might reveal valuable information for hackers, like commented out sections revealing person data
server-side vs. client-side security
server side languages are not seen by users — more secure
(JavaScript is both sever and client slide)
What are botnes?
(NOT NEEDED FOR EXAM)
When a hacker gained access to your computer/website, it will build in a backdoor for future access - creating an army of zombie computers that can perform any kind of task like data crunching, theft, etc.
In order to write secure code, we must assume: