Home  >  Article  >  Backend Development  >  PHP Security - Session Data Exposed

PHP Security - Session Data Exposed

黄舟
黄舟Original
2017-02-21 09:25:051505browse


Session data exposure

Session data often contains some personal information and other sensitive data. For this reason, exposure of session data is a common concern. Generally speaking, the scope of exposure is not very large because the session data is saved in the server environment, not in the database or file system. Therefore, session data is naturally not exposed publicly.

Using SSL is a particularly effective means of minimizing the possibility of data being exposed when transmitted between the server and the client. This is very important for applications that transmit sensitive data. SSL provides a layer of protection on top of HTTP so that all data in HTTP requests and responses is protected.

If you are concerned about the security of the session data save area itself, you can encrypt the session data so that its contents cannot be read without the correct key. This is very easy to do in PHP, you just use session_set_save_handler( ) and write your own processing functions for session encrypted storage and decrypted reading. Regarding the issue of encrypted session data storage area, see Appendix C.

The above is the content of PHP security-session data exposure. For more related content, please pay attention to the PHP Chinese website (www.php.cn)!


Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn