ChapterÂ 11.Â Security
When users sign up for an account on your website, they trust that you will keep their data safe and secure. Unfortunately, as the popularity of your application increases, so does the likelihood of attack. Even if your application is not popular yet, it can still fall victim to automated systems that scan the web looking for vulnerable sites.
In this chapter, youâll learn about four of the most common security vulnerabilities and how to protect your site from them. Weâll discuss authorization, injection, cross-site scripting, and cross-site request forgery attacks.
You created an authentication system in ChapterÂ 9, but authentication is not the same thing as authorization. Authentication identifies ...