2024年5月7日发(作者:火币官方网站下载)
[3] Safe Harbor Privacy Framework, U.S. Department of Commerce,
[4] Financial Privacy: The Gramm-Leach Bliley Act (GLBA), Federal Trade Commission,
[5] Health Insurance Portability and Accountability Act (HIPAA), U.S. Department of Human Services,
[6] California SB-1386, Government of the State of California, 2002,
[7] M. Howard, D. LeBlanc, Writing Secure Code, Second Edition, Microsoft Press, 2003
[8] SQLCipher.,
[9] FUNDAMENTALS-4: Establish trust boundaries, Oracle,
[10] CONFIDENTIAL-2: Do not log highly sensitive information, Oracle,
[11] INPUT-1: Validate inputs, Oracle,
[12] Standards Mapping - Common Weakness Enumeration, CWE ID 359
[13] Standards Mapping - OWASP Mobile Top 10 Risks 2014, M2 Insecure Data Storage
[14] Standards Mapping - OWASP Top 10 2007, A6 Information Leakage and Improper Error Handling
[15] Standards Mapping - OWASP Top 10 2013, A6 Sensitive Data Exposure
[16] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1, Requirement 3.2, Requirement 3.4, Requirement 4.2,
Requirement 8.4
[17] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2, Requirement 3.2, Requirement 3.4, Requirement 4.2,
Requirement 6.5.6, Requirement 8.4
[18] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0, Requirement 3.2, Requirement 3.4, Requirement 4.2,
Requirement 6.5.5, Requirement 8.4
[19] Standards Mapping - Payment Card Industry Data Security Standard Version 3.0, Requirement 3.2, Requirement 3.4, Requirement 4.2,
Requirement 8.2.1
[20] Standards Mapping - Payment Card Industry Data Security Standard Version 3.1, Requirement 3.2, Requirement 3.4, Requirement 4.2,
Requirement 8.2.1
[21] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2, Requirement 3.2, Requirement 3.4, Requirement 4.2,
Requirement 8.2.1
[22] Standards Mapping - Security Technical Implementation Guide Version 3.1, APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I
[23] Standards Mapping - Security Technical Implementation Guide Version 3.10, APP3210.1 CAT II, APP3340 CAT I
[24] Standards Mapping - Security Technical Implementation Guide Version 3.4, APP3210.1 CAT II, APP3340 CAT I
[25] Standards Mapping - Security Technical Implementation Guide Version 3.5, APP3210.1 CAT II, APP3340 CAT I
[26] Standards Mapping - Security Technical Implementation Guide Version 3.6, APP3210.1 CAT II, APP3340 CAT I
[27] Standards Mapping - Security Technical Implementation Guide Version 3.7, APP3210.1 CAT II, APP3340 CAT I
[28] Standards Mapping - Security Technical Implementation Guide Version 3.9, APP3210.1 CAT II, APP3340 CAT I
[29] Standards Mapping - Security Technical Implementation Guide Version 4.1, APSC-DV-000650 CAT II, APSC-DV-001740 CAT I,
APSC-DV-001750 CAT I, APSC-DV-002330 CAT II, APSC-DV-002570 CAT II, APSC-DV-002580 CAT II
[30] Standards Mapping - Web Application Security Consortium 24 + 2, Information Leakage
[31] Standards Mapping - Web Application Security Consortium Version 2.00, Information Leakage (WASC-13)
发布者:admin,转转请注明出处:http://www.yc00.com/xitong/1715090337a2564463.html
评论列表(0条)