Securing Web Applications
In this chapter, we are going to explore how to improve the security of our web applications. We will start by discussing the impact of a security incident on businesses and how to get started with security in our day-to-day work. Then we will explore key resources such as the OWASP Top 10, the Common Weakness Enumeration (CWE), and the Common Vulnerabilities and Exposures (CVE) to improve our understanding of security in modern web applications.
Then, we will explore the Node.js threat model and the official Node.js best practices to improve the security of our applications. We will apply this knowledge to create a checklist that we can use to improve the security of our existing applications.
Finally, we will explore how to take advantage of our security knowledge to become an ethical hacker and how to skill up while participating in community events and bug bounty programs.
To sum up, here are the main topics that we will explore in this chapter...