X-Git-Url: https://git.martlubbers.net/?a=blobdiff_plain;f=report%2Freflection.secure_development.tex;h=7abdba1b0a1540dbf0c2b65ec3badea1e5a0d414;hb=a3400d1700e841084471bd01f91ddf9234c9413f;hp=4729d4383dec2ee1a51069befcf2be1dde051a79;hpb=bbd53815ca081140fc8b22e9b4f2790bbad20528;p=ssproject1617.git diff --git a/report/reflection.secure_development.tex b/report/reflection.secure_development.tex index 4729d43..7abdba1 100644 --- a/report/reflection.secure_development.tex +++ b/report/reflection.secure_development.tex @@ -22,14 +22,14 @@ development time. This would also require more careful planning of the development of the application. % Centralize user input -Another improvement which would streamline the security audit would be to -centralize the locations in which user input is handled. By doing this the whole -class of vulnerabilities which stems from the handling of user input could be +Another improvement which would streamline a security audit would be to +centralize the locations in which user input is handled. By doing this, the whole +class of vulnerabilities which stems from handling user input could be neutralized to an extent. This would be a relatively easy change in the -development process with comparatively big security benefits. +development process with big security benefits. % Centralize application output -In the same category; during development the application could be designed in +In the same category; the application could be designed in such a way that all dynamic output is sanitized before outputting it to the user. This would create another defense{-}in{-}depth layer for handling attacker controlled input.