Answer:
Input Validation.
Step-by-step explanation:
Also known as Data validation, this technique checks all data that users or third parties submit to the system and prevents the entrance of badly formatted data. A data dictionary can be used to validate all incoming data or application programs specifically designed for that role.
If information is not properly validated, it can become a security breach, that can lead to injection attacks and compromised systems.