Главная
Study mode:
on
1
Intro
2
OWASP Top 10 Risks - 2013
3
Cyber attacks
4
OWASP Application Security Verification Standard (ASVS)
5
OWASP ASVS
6
Verify for Security Early and Often
7
SOL injection example
8
Parameterize Queries
9
XSS Example
10
Contextual Encoding Libraries
11
Example of Validations
12
2nd Order SQL Injection Example
13
CS. Implement Identity and Authentication Controls
14
Strong cryptographic algorithms
15
Secure Password Storage
16
C5. Password Storage - How Not To Do It!
17
C5. Error Messages - How Not To Do It!
18
C5. Risks Addressed
19
Implement Appropriate Access Controls
20
Implement Logging and Intrusion Detection
21
Risks Addressed - All Top Ten!
22
Current state of software
23
Unmanaged 3 Party Components
24
Don't leak information
25
@OWASP Controls
Description:
Explore the path to secure software development in this OWASP Foundation conference talk from AppSec EU 2017. Delve into proactive security controls and techniques that developers can incorporate throughout the software development lifecycle. Learn how to defend against cyber attacks at the application layer by implementing security measures during the coding process. Discover real-world examples of solving prevalent internet security problems, including SQL injection and cross-site scripting (XSS). Examine the OWASP Top 10 Risks, Application Security Verification Standard (ASVS), and best practices for identity authentication, access control, and logging. Gain insights on parameterizing queries, using contextual encoding libraries, implementing strong cryptographic algorithms, and secure password storage. Understand the importance of early and frequent security verification, managing third-party components, and preventing information leakage. Ideal for developers and security professionals seeking to enhance application security from the ground up. Read more

The Path of Secure Software Development - AppSec EU 2017

OWASP Foundation
Add to list
0:00 / 0:00