Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
After Report
SQL Injection: Classification
Decompose the Injection Data interpreted as Code
Extract Security Controls
Security Controls: Security Logging
Best Types of Detection Points
Examples of Intrusion Detection Points
Secure Data Handling: Basic Workflow
Storage by Data Types
Data at Rest: Design Vulnerability Example
Security Controls: Data at Rest Encryption Cryptographic Storage
Security Controls: Data in Transit
Root Cause The type of software with vulnerable components
Fundamental Security Principle
Components Examples
Implement a Logging Library
Simple Wrapper
Implement a Payment Gateway Scenario • Vendor APS-line payment gateways . Can have more than one payment gateway in an application • Required to be interchangeable
Adapter Design Pattern
Implement a Single Sign-On
Façade Design Pattern
Secure Software Starts from Design!
Configuration Hardening
Final Takeaways
Security Controls for Secure Development
Global AppSee Amsterdam
Taught by
OWASP Foundation
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube