One of the most consistently reported software security vulnerabilities that leads to major exploits is:
Lack of malware detection.
Attack surface decrease.
Inadequate network hardening.
Poor input validation.
D: With coding there are standards that should be observed. Of these standards the most fundamental is input
validation. Attacks such as SQL injection depend on unfiltered input being sent through a web application. This
makes for a software vulnerability that can be exploited. There are two primary ways to do input validation:
client-side validation and server-side validation. Thus, with poor input validation you increase your risk with
regard to exposure to major software exploits.