Sara is a skilled software developer and manage a crucial project, building an online shopping cart for a well-known e-commerce site. This cart would process a high volume of transactions, including sensitive details like payment information. With the increasing security threats to e-commerce applications, Sara was planning to implement protections against Operating System (OS) command injection. She understood the risks and made sure the system would not be vulnerable to this type of attack.

Based on the given scenario, answer the following questions.

(a)

Describe key characteristics and risks associated with command injection attacks on vulnerable applications.

(5 marks)

(b)

Discuss FIVE (5) secure coding principle that Sara can apply to prevent against OS command injection.

More Abdullahi ABUBAKAR Ubandoma's questions See All
Similar questions and discussions