Which mitigation technique helps to prevent insecure direct object references?

A. access checks
B. input validation
C. fuzzing
D. filtering input parameters


A
Explanation: Applications don't always verify the user is authorized for the target object. This results in an insecure direct object reference flaw. This attack can come from an authorized user, meaning he has permission to use the application but he is accessing information for which he should not have access. To prevent this problem, each direct object reference should undergo an access check. Code review of the application with this specific issue in mind is also recommended.

Computer Science & Information Technology

You might also like to view...

Which of the following will not help prevent infinite loops?

a. Include braces around the statements in a do...while statement. b. Ensure that the header of a for or while statement is not followed by a semicolon. c. If the loop is counter-controlled, the body of the loop should increment or decrement the counter as needed. d. If the loop is sentinel-controlled, ensure that the sentinel value is input eventually.

Computer Science & Information Technology

Marking a location with a(n) path does not change your document's appearance in any way; it merely creates a destination within your document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Changing the width and/or height of an image does not affect its resolution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking Questions Case 6-1 Cayden is creating a Photo Album in PowerPoint 2016 to show at his sister's wedding. ? Cayden wants to rotate one of his pictures. When he clicks a Rotate button it rotates the picture ____ degrees.

A. 45 B. 90 C. 180 D. 360

Computer Science & Information Technology