Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
After Report
SQL Injection: Classification
Decompose the Injection Data interpreted as Code
Extract Security Controls
Security Controls: Security Logging
Best Types of Detection Points
Examples of Intrusion Detection Points
Secure Data Handling: Basic Workflow
Storage by Data Types
Data at Rest: Design Vulnerability Example
Security Controls: Data at Rest Encryption Cryptographic Storage
Security Controls: Data in Transit
Root Cause The type of software with vulnerable components
Fundamental Security Principle
Components Examples
Implement a Logging Library
Simple Wrapper
Implement a Payment Gateway Scenario • Vendor APS-line payment gateways . Can have more than one payment gateway in an application • Required to be interchangeable
Adapter Design Pattern
Implement a Single Sign-On
Façade Design Pattern
Secure Software Starts from Design!
Configuration Hardening
Final Takeaways
Security Controls for Secure Development
Global AppSee Amsterdam
Taught by
OWASP Foundation
Related Courses
Fixing Healthcare DeliveryUniversity of Florida via Coursera Effective Problem-Solving and Decision-Making
University of California, Irvine via Coursera Process Improvement
University of Illinois at Urbana-Champaign via Coursera مهارات حل المشكلات واتخاذ القرارات
Edraak Six Sigma Part 2: Analyze, Improve, Control
Technische Universität München (Technical University of Munich) via edX