Table of Contents
- List of Examples
- List of Figures
- List of Tables
- Title and Copyright Information
- 1 Preface
-
2
How to address the OWASP Top10 in Oracle
Banking Corporate Lending
- 2.1 Injection
- 2.2 Broken Authentication and Session Management
- 2.3 Cross-Site Scripting (XSS)
- 2.4 Insecure Direct Object References
- 2.5 Security Misconfiguration
- 2.6 Sensitive Data Exposure
- 2.7 Missing Function Level Access Control
- 2.8 Cross-Site Request Forgery (CSRF)
- 2.9 Using Components with Known Vulnerabilities
- 2.10 Unvalidated Redirects and Forwards Network Security
-
3
Securing Gateway Services
- 3.1 Inbound Application Integration
- 3.2 EJB Based Synchronous Deployment Pattern
- 3.3 Web Services Based Synchronous Deployment Pattern
- 3.4 HTTP Servlet Based Synchronous Deployment Pattern
- 3.5 MDB Based Asynchronous Deployment Pattern
- 3.6 Outbound Application Integration
- 3.7 Securing Web Services
- 3.8 Accessing Service and Operation
- 3.9 Gateway Password Generation Logic for External System Authentication
- 3.10 XSD Validation and Input Validation
- 3.11 List of Services
- 3.12 List of Interfaces