Summary

As we progressed through this chapter, we got to learn about the different security principles that govern the development and operation of software applications. We talked about needing to maintain high security standards with respect to enterprise applications, and what happens if the application's security is breached. We then learned about the challenges that system security faces nowadays. Then, we moved on to the common attack vectors that are used to compromise an application's security.

Once we had an idea about the attack vectors, we took a look at some common security anti-patterns that compromise the security of your application, as well as the data associated with the application. Once we had the knowledge of these anti-patterns, we went through some of the recommendations that can help us to tackle the problem of application security.

Now, as we move on to the next part of this book, we will take a look at a new way of building enterprise applications, in which an application is not a single, large application built using different, glued-together components, but a set of small services that communicate with each other to handle certain business use cases. Let's take a look at this approach of application development in the next chapter.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.34.62