Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Data received by a component from a source outside the component's trust boundary may be malicious. Consequently, the program must take steps to ensure that the data are both genuine and appropriate.

Image RemovedImage Added

These steps can include the following:

...