A security analyst is assisting a team of developers with best practices for coding. The security analyst would
like to defend against the use of SQL injection attacks. Which of the following should the security analyst
recommend first?
A. Tokenization
B. Input validation
C. Code signing
D. Secure cookies
like to defend against the use of SQL injection attacks. Which of the following should the security analyst
recommend first?
A. Tokenization
B. Input validation
C. Code signing
D. Secure cookies