Summary

By now, you are familiar with the basics of application security. We have covered enough background information in this chapter to understand a multi-layer security approach. Although web applications can efficiently exchange information, the fact still remains that these applications can be attacked. A number of new security threats have also arisen. If not handled properly, these issues could potentially pose significant risks to an organization's information technology infrastructure. Since it is all about data security, individual data is very important. Consequently, it becomes very important for organizations to design a robust web system aligned with GDPR to protect users' information.

In the next chapter, we will discuss an ...

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.