What are the alternative approaches to saving data securely to the database in web development using PHP and MySQL?
Tuesday, 08 August 2023
by EITCA Academy
In web development using PHP and MySQL, there are several alternative approaches to saving data securely to the database. These approaches involve various techniques and best practices that aim to ensure the integrity, confidentiality, and availability of the data stored in the database. In this answer, we will explore some of these alternative approaches and
How does using an Object Relational Mapper (ORM) help mitigate sequel injection vulnerabilities?
Saturday, 05 August 2023
by EITCA Academy
An Object Relational Mapper (ORM) is a software tool that facilitates the interaction between a relational database and an application by mapping objects to database tables. It provides an abstraction layer that allows developers to work with objects instead of directly interacting with the underlying database. This abstraction can help mitigate sequel injection vulnerabilities, which
- Published in Cybersecurity, EITC/IS/WASF Web Applications Security Fundamentals, TLS attacks, Transport layer security, Examination review
Tagged under:
Cybersecurity, Input Sanitization, ORM, Parameterized Queries, Query Building, Sequel Injection

