Session Hijacking Session Fixation Url Hijacking User ... (forgot the right word, test if the user id has been used in your system) Leave no important or sensitive data in Web Cache HTTPS Setup Access Rules for all URL resources Multi-factor authentication Certified Password Manager and Generator, Use long password such as 1K ( applicable to some users who can do multi-factor authentication) 字典登录攻击 White-listing IPs for Internal Servers, Never Expose Internal Server to Public Access Regular Expression or Other DDoS Minimum Necessary Rights Post vs. Get Coding Practice Audit Log for Security-Required Access or Data Change Of course, SQL-Injection and XSS are most important
For XSS, do not trust any user's input or url parameters unless you verify and escape it.
【在 a*f 的大作中提到】 : Session Hijacking : Session Fixation : Url Hijacking : User ... (forgot the right word, test if the user id has been used in your : system) : Leave no important or sensitive data in Web Cache : HTTPS : Setup Access Rules for all URL resources : Multi-factor authentication : Certified Password Manager and Generator, Use long password such as 1K (