| http://www.w3.org/ns/prov#value | - It should be nearly impossible to extract that data even if the business data is vulnerable to SQL injection.The authentication logic and services should be isolated from the application logic.Authentication should be tested independently and regularly.There are a lot of issues at play here and encryption is only one of them.
|