From 803e661354275477aeb3eef35e7b0f5612ae0f87 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Mon, 20 Jun 2022 10:17:03 +1200 Subject: [PATCH] vault backup: 2022-06-20 10:17:03 --- content/notes/COSC 202 Jet Hughes.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/content/notes/COSC 202 Jet Hughes.md b/content/notes/COSC 202 Jet Hughes.md index aa1feed4b..a1abdfd85 100644 --- a/content/notes/COSC 202 Jet Hughes.md +++ b/content/notes/COSC 202 Jet Hughes.md @@ -86,16 +86,16 @@ ii) Often there is no library that perfectly matches your specific needs, and it
# 7 Security -a) Users will try to input malicious data to your software. For example, an Injection attack. This is when the user inputs data to a form, which tries to change the underlying - - - +a) Users will try to input malicious data to your software. For example, an SQL Injection attack. This is when the user inputs data to a form, which tries to change the underlying SQL string, and alter the data in the database, in a malicious way. This can usually be avoided by using SQL prepared statements, or secure datbase abstraction. +b) more software ∴ more dependecies ∴ more complex ∴ more "surface area" of risk of vulnerability. so it is very important to manage which dependencies you have, and monitor their status, so you can quickly resolve any vulnerabilities they might introduce, or remove, them entirely if necessary.
-# 8 Graphs - +# 8 Software Licensing +a) Authors copyright holds for software that does not have a specific license. This means +b) Copyleft licenses require, software that uses other code with a copyleft license to use the same license. i.e., code with a copyleft license requires it's derivatives to have the same requirements. This is not enforced with other licenses like MIT or CC-0 +c)