Use HTTPS - stops "man in middle" attack Use load balancer - control internal vs external applications Input validation mandatory. 2-factor authentication Restrict failed attempt to avoid malicious logins Captcha to avoid the bot. a session should have timeout based on application criticality re-verify login for critical data access Limit access rate to stop Denial of service attack. prevent SQL injections ( "select * from students where student_name =" + name + ";") Encrypt data on 3rd party storage Hash the passwords
Collection of Interview Question on Data structure, Algorithm, Java, C++ and more