English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

2007-07-13 04:55:00 · 2 answers · asked by vivek patel 1 in Computers & Internet Security

2 answers

Need just a bit more information to make a good recommendation about this. The question is to broad.

2007-07-13 07:12:22 · answer #1 · answered by mcgranem 3 · 0 0

Although the question is overly broad,
You can start your approach by separating deployment from development (coding) issues.

You should architect security into how the different pieces fit together.

You should restrict how input is accepted by proper input validation and the use of stored procedures.

You should run everything with least required permissions.

These are all good practices regardless whether the database is relational or not.

2007-07-13 21:21:22 · answer #2 · answered by Tony S 3 · 0 0

fedest.com, questions and answers