To build secure solutions that use remoting technology, you need to know the associated threats. The top threats to components that use remoting are:
Figure 13-2 shows these threats.
Figure 13-2. Main remoting threat
Remote components that provide sensitive or restricted information should authenticate and authorize their callers to prevent unauthorized access. Weak authentication and authorization can be exploited to gain unauthorized access to sensitive information and operations.
Vulnerabilities that make your remoting ...