Главная
Study mode:
on
1
Intro
2
OWASP Top 10 Risks 2017 - RC2
3
Cyber attacks
4
OWASP Application Security Verification Standard
5
Verify for Security Early and Often
6
Parameterize Queries
7
XSS Payloads
8
Encode Your Output DO YOU WANT RSS
9
Contextual Encoding OWASP Java Encoder Project
10
Example of Validations
11
2nd Order SQL Injection Example
12
Vulnerabilities Addressed - All Top10!
13
Implement Authentication Controls
14
Strong cryptographic algorithms
15
Secure Password Storage
16
C5. Password Storage - How Not To Do It!
17
Implement Appropriate Access Controls
18
Implement Logging and Intrusion Detection
19
Examples of Intrusion Detection Points
20
Vulnerabilities Addressed - All Top 10!
21
Unmanaged 3rd Party Components
22
Design Patterns for Integration
23
Best Practices
24
Don't leak information
25
Project Page
Description:
Explore the path to developing secure software in this 46-minute conference talk from Devoxx. Delve into proactive security controls and techniques that developers can incorporate throughout the software development lifecycle to defend against cyber attacks at the application layer. Learn how to implement security best practices while writing code, with real-world examples addressing prevalent internet security issues. Discover the OWASP Top 10 Risks, Application Security Verification Standard, and strategies for early and frequent security verification. Master techniques such as query parameterization, output encoding, input validation, and secure authentication controls. Gain insights on implementing appropriate access controls, logging, intrusion detection, and managing third-party components securely. Benefit from the expertise of Katy Anton, a security professional with a software development background and OWASP Top Ten Proactive Controls project leader, as she guides developers towards building more resilient applications. Read more

The Path of Secure Software

Devoxx
Add to list
0:00 / 0:00