Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
After Report
SQL Injection: Classification
Decompose the Injection Data interpreted as Code
Extract Security Controls
Security Controls: Security Logging
Best Types of Detection Points
Examples of Intrusion Detection Points
Secure Data Handling: Basic Workflow
Storage by Data Types
Data at Rest: Design Vulnerability Example
Security Controls: Data at Rest Encryption Cryptographic Storage
Security Controls: Data in Transit
Root Cause The type of software with vulnerable components
Fundamental Security Principle
Components Examples
Implement a Logging Library
Simple Wrapper
Implement a Payment Gateway Scenario • Vendor APS-line payment gateways . Can have more than one payment gateway in an application • Required to be interchangeable
Adapter Design Pattern
Implement a Single Sign-On
Façade Design Pattern
Secure Software Starts from Design!
Configuration Hardening
Final Takeaways
Security Controls for Secure Development
Global AppSee Amsterdam
Taught by
OWASP Foundation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network