Which mitigation technique helps to prevent insecure direct object references?

A. access checks
B. input validation
C. fuzzing
D. filtering input parameters

A
Explanation: Applications don't always verify the user is authorized for the target object. This results in an insecure direct object reference flaw. This attack can come from an authorized user, meaning he has permission to use the application but he is accessing information for which he should not have access. To prevent this problem, each direct object reference should undergo an access check. Code review of the application with this specific issue in mind is also recommended.

Computer Science & Information Technology

You might also like to view...

You can select an entire paragraph by ________ anywhere in the paragraph

A) clicking B) right-clicking C) triple-clicking D) double-clicking

Computer Science & Information Technology

There are selection buttons on the Options bar that are used to add or or subtract from a selection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology