Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Data received by a component from a source outside the component's trust boundary can be malicious and can result in an injection attack, as shown in the scenario in Figure1 – Figure 1--1.

Programs must take steps to ensure that data received across a trust boundary is appropriate and not malicious. These steps can include the following:

...