Skip main navigation

Mitigation

In this video, you will learn what to look for and rectify in the source code to avoid flaws in your access control.

In this video, you will learn what to look for and rectify in the source code to avoid flaws in your access control.

Now that you have an understanding of how hackers can take advantage of authorization flaws in your database, you will learn how to mitigate these threats. This video will demonstrate what to look for in the source code to identify the weaknesses in your access control and what you can do to fix these flaws.

Investigate and share: Go to OWASP Broken Access Control to read more about the table we reviewed in step 2.12 Threat Analysis. Share and discuss the points that you think are most important.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now