This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Java leading security practice"
From OWASP
(→Introduction) |
|||
Line 2: | Line 2: | ||
==Introduction== | ==Introduction== | ||
− | This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. | + | This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. So when we are performing a codfe review on some Java code we should look at the following areas of concern. Getting developers to adopt leading practice techniques gives the inherent basic security features all code should have, "Self Defending Code". |
+ | |||
Revision as of 11:14, 14 August 2007
OWASP Code Review Guide Table of ContentsIntroduction
This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. So when we are performing a codfe review on some Java code we should look at the following areas of concern. Getting developers to adopt leading practice techniques gives the inherent basic security features all code should have, "Self Defending Code".
Class Access
- Methods
- Fields
- Mutable Objects