Chapter 11

The Unseen Back End

From the viewpoint of a programmer or hacker, the most interesting aspect of a software package or working website is the back-end infrastructure where the actual processing goes on. For the programmer building a package or business website, accuracy of data and smooth flow of iterations are important, but the hacker looks for vulnerabilities to get into the back end and steal or corrupt data. In other words, the back end is the real structure where everything is positioned and steers the users correctly.

We almost always have a database connected on the back end to store and retrieve data. Invariably the data contains personally identifiable information (PII) such as email addresses, credit card numbers, and other ...

Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.