Key Takeaways - Secure Development

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

35 hours 10 minutes
Video Transcription
greetings. And welcome back to Siberia is *** Tia certified Van Security Practitioners certification. Preparation course.
This is a continuation on margin number six. In fact, this is the very last video in this particular module and its title Security development.
These are objectives which encompasses margin. Almost six.
Doing this particular presentation, we discussed software vulnerabilities, which was section one.
Then we moved on and turns our discussion by taking a look at Section two, which was title software development. In this particular presentation, we're gonna take a look at some key takeaways from this particular Marge Number six, which was titled Secure Development
Here again are the key takeaways. We're gonna kind of highlight at this point in time,
we learned that a software vulnerability is a glitch flaw, a weakness present in the software or operated system. We've just also discussed a vulnerable suspect is the process of identifying, quantified and prioritize. The volume is in the system. We also learn about and discuss a volatile suspect process
and learned that is intended to identify threats and breast a pose typically involved in the use automate testing to such as network security scanners.
We learned also that a vulnerability is a cybersecurity term that refers to a flaw in your system that can leave it open to attack.
Additionally, we learned that a vulnerable it may also refer to any type of weakness and your computer system itself, perhaps in a set of procedures or anything that leaves your infant security system exposed to a threat.
Continue on In this discussion, we learn, we learn and also discuss what in fact was a buffer overflow. We learned that that curse when Mom or Dad has written to a buffer, then it can hold.
We learned a buffalo floor happen when there is improper validation.
We also discussed the buffalo. Maybe one of the worst books that could be exploited by an attack of most of the cost is very hard to find and fix. We also discussed the importance and also look that cold we use, which is another name is implies, implies the use of a single piece. Of course, several time written,
whether it's within an application or reuse an application involved one
birds into the next. In other words,
we discussed cross that scripting, which again we learned is the type of computer security vulnerably typically found in Web application.
We discuss across site request forgery.
Basically, it's an attack vector that tricks a Web browser into executing an unwanted action in an application to what your user is logged into.
We also learned and discussed the importance of indication, and we learned this the process. Verifying the identity of a person or device, a common examples. Internet user name and password. When you log into a website,
we discussed software assurance. We learned that is defined as a level of confidence that this always free from vulnerabilities. We also looked at secure code, and we learned it's a practice of writing Cole that's protected from vulnerabilities,
and our upcoming presentation will be moving on to in our discussion by taking a look at Martin. Almost seven will just tired or network security architecture again. I wanna thank you very much for your attention to detail, doing the particulars discussion of this mantra, and I look forward to seeing you in the very next video
Up Next