Which of the following elements in web.xml file ensures that cookies will be transmitted over an encrypted channel?
In which phase of secure development lifecycle the threat modeling is performed?
Identify the type of attack depicted in the figure below:
Stephen is a web developer in the InterCall Systems. He was working on a Real Estate website for one of his clients. He was given a task to design a web page with properties search feature. He designed the following searchpage.jsp < form Id="form1" method="post" action="SearchProperty.jsp" > < input type="text" id=''txt_Search" name="txt_Search" placeholder="Search Property..." / > < input type="Submit" Id="Btn_Search" value="Search" / > < /form > However, when the application went to security testing phase, the security tester found an XSS vulnerability on this page. How can he mitigate the XSS vulnerability on this page?
Jacob, a Security Engineer of the testing team, was inspecting the source code to find security vulnerabilities. Which type of security assessment activity Jacob is currently performing?
Sam, an application security engineer working in INFRA INC., was conducting a secure code review on an application developed in Jav a. He found that the developer has used a piece of code as shown in the following screenshot. Identify the security mistakes that the developer has coded?