Solved

When do you add security to your apps?

Posted on 2016-09-02
3
53 Views
Last Modified: 2016-09-02
When building a new php application do you create the security functions, validation etc at the same time as the functionality, or do you add it once you have the basic of the app working?

I created some very effective security functions, which seem to be slowing down development/testing. Wondering how others deal with this.
0
Comment
Question by:Stephen Forlance
3 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 250 total points
ID: 41782404
Security and validation pretty much must be built into the functions.  It is difficult to add it back in.  But just like anti-virus, it will slow things down.  Maybe you're 'overdoing' it.
0
 
LVL 109

Assisted Solution

by:Ray Paseur
Ray Paseur earned 125 total points
ID: 41782438
You might want to show us the code that is slowing things down.  We might be able to spot the issues.  Please include your test case information, so we can replicate your test environment and see the slowdown in action.

You might consider using the Laravel framework.  It will handle validation and security for you, with state-of-the-art processes that will not slow you down.

If you've created effective security functions, but wonder about performance, you might want to post them on GitHub and ask the open-source community to have a look, fork, send pull requests, etc.
0
 
LVL 52

Assisted Solution

by:Scott Fell, EE MVE
Scott Fell,  EE MVE earned 125 total points
ID: 41782446
I would say it depends.  

I like to add log in from the start because many functions rely on logged in state (at least for what I work on).  But when I am creating a new page that may be more complex, I may create a single page with only my raw server side code.  Once I am happy with my logic, I add a new page and incorporate what I created in my test page.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The viewer will learn how to dynamically set the form action using jQuery.
The viewer will learn how to count occurrences of each item in an array.

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now