Summary
As we progressed through this chapter, we got to learn about the different security principles that govern the development and operation of software applications. We talked about needing to maintain high security standards with respect to enterprise applications, and what happens if the application's security is breached. We then learned about the challenges that system security faces nowadays. Then, we moved on to the common attack vectors that are used to compromise an application's security.
Once we had an idea about the attack vectors, we took a look at some common security anti-patterns that compromise the security of your application, as well as the data associated with the application. Once we had the knowledge of these anti-patterns, we went through some of the recommendations that can help us to tackle the problem of application security.
Now, as we move on to the next part of this book, we will take a look at a new way of building enterprise applications, in which an application...