CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted.
What is the defensive technique employed by Bob in the above scenario?
tc5899
Highly Voted 1 year, 6 months agoMann098
Most Recent 3 months, 3 weeks agoNicknp
5 months, 2 weeks agoI_Know_Everything_KY
8 months, 1 week agoinsaniunt
11 months agoHeyacedoGomez
1 year, 6 months agoeli117
1 year, 6 months ago