Useful Links
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
Secure Coding Practices
Input Validation
Validation Principles
Trust Boundaries
Input Sanitization
Output Encoding
Validation Techniques
Whitelist Validation
Blacklist Validation
Regular Expression Validation
Length and Range Validation
Common Input Vulnerabilities
Buffer Overflows
Format String Attacks
Path Traversal
Injection Attack Prevention
SQL Injection
Parameterized Queries
Prepared Statements
Stored Procedures
Input Validation
Command Injection
Command Execution Risks
Safe Alternatives
Input Sanitization
XML Injection
XML External Entity Attacks
XML Parser Configuration
Schema Validation
Script Injection
Cross-Site Scripting
Output Encoding
Content Security Policy
Secure Serialization
Serialization Risks
Arbitrary Code Execution
Data Tampering
Information Disclosure
Deserialization Vulnerabilities
Gadget Chains
Object Injection
Type Confusion
Secure Deserialization Practices
Input Validation
Deserialization Filters
Alternative Serialization
Serialization Alternatives
JSON Serialization
XML Serialization
Protocol Buffers
Access Control Implementation
Principle of Least Privilege
Minimal Permissions
Role-Based Access
Time-Limited Access
Authorization Patterns
Centralized Authorization
Attribute-Based Control
Context-Aware Access
Access Control Enforcement
Method-Level Security
Resource-Level Security
Data-Level Security
Sensitive Data Protection
Data Classification
Sensitivity Levels
Handling Requirements
Storage Requirements
Cryptographic Protection
Encryption at Rest
Encryption in Transit
Key Management
Memory Management
Sensitive Data Clearing
Garbage Collection Considerations
Memory Dumps
Configuration Security
External Configuration
Environment Variables
Secure Storage
Error Handling and Logging
Secure Error Handling
Information Disclosure Prevention
Generic Error Messages
Error Code Mapping
Logging Security
Log Injection Prevention
Sensitive Data Masking
Log Integrity
Monitoring and Alerting
Security Event Detection
Anomaly Detection
Incident Response
Concurrency Security
Thread Safety
Race Conditions
Synchronization Mechanisms
Atomic Operations
Secure Concurrent Design
Immutable Objects
Thread-Local Storage
Lock-Free Programming
Deadlock Prevention
Lock Ordering
Timeout Mechanisms
Deadlock Detection
Previous
7. Authentication and Authorization
Go to top
Next
9. Modern Java Security Features