From the course: Foundational JavaScript Security
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Sensitive data - JavaScript Tutorial
From the course: Foundational JavaScript Security
Sensitive data
- [Instructor] Like a broken authentication, having a plan to properly hide sensitive user or obligation data is crucial. Take a look at all the data available in your application. What are the areas that would be safe for public consumption and the ones that are private or could be exploited? For example, in general, all user data should be considered sensitive and hidden from the public eye, and take a look at the data users generate. Can it be public or not? Once you have a plan, you need to implement some of the strategies mentioned in the previous video, proper crypto hashing, HTTPS protocols, and the use of advanced tools like JSS Scrambler. JSS Scrambler goes a step further than just a simple crypto. It works at a deeper level with your code logic and scrambles your code and data so it isn't easy to reverse engineer your minify code and figure out what function does what. At the end of the day, you need to have a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Injection threat2m 21s
-
(Locked)
Broken authentication1m 57s
-
(Locked)
Sensitive data1m 5s
-
(Locked)
XML external entities1m 10s
-
(Locked)
Security misconfiguration1m 28s
-
(Locked)
Insecure deserialization1m 17s
-
(Locked)
Components with known vulnerabilities1m 2s
-
(Locked)
Insufficient logging and monitoring1m 37s
-
(Locked)
Challenge: What is the best resource for top threats?25s
-
(Locked)
Solution: What is the best resource for top threats?39s
-
(Locked)
-
-