Главная
Study mode:
on
1
Intro
2
Katy Anton
3
Common Weakness Enumeration
4
CWEs in Injection Category
5
Decompose the Injection
6
Extract Security Controls
7
Security Controls: Security Logging
8
The 6 Best Types of Detection Points
9
Examples of Intrusion Detection Points
10
Secure Data Handling: Basic Workflow
11
Data at Rest: Design Vulnerability example
12
Tool for Publicly Disclosed Machine Keys
13
Encryption: Security Controls
14
Data in Transit: Security Controls
15
State of Software Security
16
Root Cause
17
What is Attack Surface?
18
Fundamental Security Principle
19
Components Examples
20
Implement Logging Library
21
Simple Wrapper
22
Implement a Payment Gateway
23
Adapter Design Pattern
24
Implement a Single Sign-On
25
Facade Design Pattern
26
Secure Software Starts from Design!
27
Rick Rescorla
28
Security Controls In Development Cycle
29
Final Takeaways
30
References
Description:
Explore a fresh perspective on security vulnerabilities in this 43-minute conference talk from NDC Conferences. Delve into the decomposition of vulnerabilities into familiar security controls, shifting focus from end-stage vulnerability measurement to integrating security measures throughout the software development cycle. Learn about CWEs, injection vulnerabilities, security logging, intrusion detection points, secure data handling, and fundamental security principles. Discover how to implement logging libraries, payment gateways, and single sign-on using design patterns. Gain insights on incorporating security controls from the design phase onwards, making security more developer-friendly and effective. Ideal for developers seeking to enhance the security of their software applications.

Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities

NDC Conferences
Add to list