After a discussion on development methodologies, we move on to examining common software architectures. This is an important topic with respect to application security and it's a slightly longer section. The architectures we discuss in this video, along with their advantages and risks, are: - Distributed computing - Terminal services and remote access servers - Peer-to-peer architecture - SOA (Service-Oriented Architecture) - Rich internet applications We then move on to discuss the threats associated with these architectures in terms of both client-side and server-side threats. It's noted that with ubiquitous computing that threats have grown exponentially. The video concludes with a discussion on the vulnerabilities associated with wireless technologies such as: - Wi-Fi - RIFID - NFC - LBS (location-based services) e.g. GPS
They are responsible for knowing where a network's possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including ...