Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
After a discussion on development methodologies, we move on to examining common software architectures. This is an important topic with respect to application security and it's a slightly longer section. The architectures we discuss in this video, along with their advantages and risks, are: - Distributed computing - Terminal services and remote access servers - Peer-to-peer architecture - SOA (Service-Oriented Architecture) - Rich internet applications We then move on to discuss the threats associated with these architectures in terms of both client-side and server-side threats. It's noted that with ubiquitous computing that threats have grown exponentially. The video concludes with a discussion on the vulnerabilities associated with wireless technologies such as: - Wi-Fi - RIFID - NFC - LBS (location-based services) e.g. GPS