BC May2024 Mod11 Software Security
BC May2024 Mod11 Software Security
Mod 13: Physical Mod 12: Environment Mod 11: Software Mod: 10 Social
Mod 10:
Mod 9: Malware
Security Monitoring Security Engineering
Who coded the software you are using? Do you know the
source?
SOFTWARE DEVELOPMENT LIFE CYCLE
• Initiation
• Requirements analysis
• Concept development
• Planning
• Design
• Development
• Testing
• Implementation
• Operations
• Disposal
MATURITY LEVELS
Maturity levels:
• Level 1
• Level 2
• Level 3
• Level 4
• Level 5
SECURITY GUIDELINES
application is changed.
DATABASE INJECTION
ATTACKS
• Countermeasures:
• Code review
• Web application firewalls
• Input sanitization
• Fuzz testing
CROSS-SITE SCRIPTING
browsing.
• Reduce privileges to decrease Access denied
MODULE REVIEW
2. Match each statement to the term it describes.
Automated application security testing A. Buffer overflow
Permission failure at the server level B. Cross-site scripting
Procedure to verify correct data entries into forms C. Fuzz testing
Client side attack D. Logical flaw
Exception generated in memory E. Input sanitization
Weakness that allows potential credential bypass F. Directory traversal
Process that documents the potential impact of G. Change management
Implementation of a product
MODULE REVIEW
3. How do you protect against cross-site scripting?
MODULE REVIEW
4. What is the fundamental principle of the software
development lifecycle?
MODULE REVIEW
5. True or false? A session ID can be found in a cookie.
MODULE REVIEW