This lesson is still being designed and assembled (Pre-Alpha version)

Secure Coding: Glossary

Key Points

  • Insecure or buggy code can have far-reaching consequences!

SQL Injection Attack
  • SQL Injection attacks exploit database code that does not perform input validation!

Heartbleed Attack
  • Heartbleed was caused by a simple missing input validation step!

Format String Vulnerability
  • Poor programming can lead to big problems.

  • One vulnerability has a lot of potential to be exploited.

  • Randomization is key to prevent attacks like this one.

Return-to-libc Attack



Cyber Human Ecosystem of Engaged Security Education
National Data Service