SlideShare a Scribd company logo
1 of 25
Deset zapovijedi za sigurno kodiranje Vatroslav Mihalj svibanj 2003.
[object Object],[object Object]
Uvod ,[object Object],[object Object],[object Object],[object Object]
1. Ne vjeruj inputu ,[object Object],[object Object],[object Object],[object Object]
2. Zaštiti se od buffer overruna ,[object Object],[object Object],[object Object],[object Object]
Primjer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3. Spriječi cross site scripting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4 Ne zahtjevaj  sa  permission ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Oprezno s kriptografskim kodom ,[object Object],[object Object],[object Object],[object Object]
6.  Reduciraj profil raspoloživ napadaču ,[object Object],[object Object],[object Object],[object Object]
7.Nemoj davati veća prava nego je potrebno ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
8. Obrati pažnju na  error handling  kod ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
9. Impersonation princip je lomljiv ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
10. Kreiraj aplikacije koje i ne-administratori mogu koristiti ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pročitati “Writing Secure Code”   Kad bude vremena...

Deset zapovijedi za sigurno kodiranje (2003)