From the course: Secure Coding in Java

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Sensitive data leak

Sensitive data leak - Java Tutorial

From the course: Secure Coding in Java

Start my 1-month free trial

Sensitive data leak

- [Instructor] Many public attacks on software systems yield some form of sensitive data leakage. We usually think of things like injection attacks as the likely culprit, but many times that isn't the case. Many times, leaking data through our exceptions or logs becomes much more out of sight, out of mind and can make a system more susceptible. When talking about sensitive data, it is important for a developer to understand what is sensitive within his or her domain. There are some universal ones, but sensitive data can also be very specific. I'm really only going to discuss the major global ones here. Now, regulatory data is any data that is controlled by a governmental or regulatory body. Obviously, this varies by jurisdiction, but as your applications extend their reach and your business itself does, you may be more under the influence of these regulatory bodies. Normally, companies have someone on staff to work…

Contents