Главная
Study mode:
on
1
Introductions
2
CAPEC
3
Threat Modeling: Client-specific
4
CWE Example
5
Relationships
6
Putting SDLC Tools into Action
7
Requirements Analysis
8
Design Considerations
9
Development
10
Testing
11
Overview: Application Penetration Test
12
Anatomy of an attack
13
Input Validation: Proper handling of user input?
14
KCG Error Handling: Too Much Information
15
SQL Injection: Can I get to the data?
16
Full Compromise: There goes my data...
17
Access Control: How deep do I go?
18
Local File Inclusion
19
Lessons Learned
Description:
Learn how to enhance your Software Development Life Cycle (SDLC) using Common Attack Pattern Enumeration and Classification (CAPEC) and Common Weakness Enumeration (CWE) in this 35-minute conference talk by Ryan Stinson from KCG at LASCON 2012. Explore threat modeling techniques, examine CWE examples, and understand their relationships. Discover how to implement SDLC tools effectively across various stages, including requirements analysis, design considerations, development, and testing. Gain insights into application penetration testing, analyzing attack anatomy, and addressing common vulnerabilities such as input validation, error handling, SQL injection, and access control issues. Conclude with valuable lessons learned to improve your overall software security practices.

Improve Your SDLC with CAPEC and CWE

LASCON
Add to list