1.4 Avoidance Strategies Against SQL Injection Attacks |
||||||||||||||||
Several avoidance strategies can be employed to safeguard against, or mitigate the impact of, SQL injection attacks. Here are high-level descriptions of each of the strategies we will examine in more detail in the subsequent lessons:
|