Greetings and welcome back the Siberia's cop Tia, certified of band security practice. Nous certification.
We're gonna continue our discussion off marginal of six.
We're just tired of secure development.
These are objectives which encompasses this particular margin. Number six.
However, we can continue. Folks are teachable, Understand? With promise for software development,
is titled Section two. We're gonna continue on with our discussion off section two of this particular Marshall.
But before we get going any further in this course freely the first or take a look at this pre assessment question. In fact, this is a true in fault or false statement and the statement is as follows
Farts tested is a type of testing. Were automatic or semiautomatic testing techniques. Are youse discover courting errors and security, new polls and software
operating system on networks by inputting imbalance or ran in medical fuzz to the system.
Is that true or false?
If you said let the true you're absolutely correct, the statements absolutely correct in regards to
If you call in the previous video, we actually began the process of Internet video by actually discussing secure coding practices and so these are some of the things I want you to be be considered as takeaways from the previous video.
One of things will always keep in mind. Do not leave security until the end of development,
because security should be an intricate part of the entire process. Because always as a future certified advance security practiced ER, you must consider the motive for the attack,
and the reality is no one is safe.
So what, in fact, our secure code status there secure code status or rules and guidelines use of event security vulnerabilities, use effectively, secure code and practice. What they're doing, in fact, may prevent they detect and eliminate errors that could compromise your software security.
Then we come to a session management. Such a magic tax occur when attacker breaks into your Web applications. Such a management mechanism to bypass the authentication controls and spook the Valent user to take next tip of you. They use a session token prediction,
or they use the session token snipping and tamping.
We come to term call first testing basic. The type of testing where you have automated are similar automated testing techniques. They're used to discover coding errors and security loopholes in your software operating system and so forth. The system is mont for various exceptions, such as crashing down, off the system off failing,
built in cold and et cetera.
So how do we do funds testing? It's simple. We have six steps we need to mention here. First, all you identify the target system.
You wanna identify inputs. Step three. Generate fuzz data. Step three executed the test using fuzzy data.
Step five. Monitor your system Behavior and last Thing Law. The Defects. Some examples off buzzes buzzes, mutation based fathers, and you have generation based type puzzles
and somewhere engineering's first test and shows the presence of bugs in an application. Fuzzy cannot guarantee to take the books completely in an application, but by using this technique, it ensures the application is robust and secure, as its technique helps to expose most of the common vulnerabilities.
Then we come to security assessment and penetration testing method. These are other method we can you lies to what? To ensure or reduce again on mitigate the potentially for again opposite dealing with the Attackers and so forth.
So we wanna have we're gonna engage in what we call security audits are very viable to reuse. We're gonna also engage what we call vulnerable assessment as well as penetration testing.
Let's not turn our teaching or discussing off post assessment question for this Section two.
And the question is as follows.
When is the founder acceptance? Testing used to perform is a prototype face be implementation phase see development face or D creation phase.
If you selected the implementation face, you're absolutely correct.
During the course of this particular presentation, we discuss the importance of secure coding standards. We learned that his rules and guidelines that used to prevent security vulnerabilities. We also discuss fuss testing, and we learned that it's a type of testing where automated or similar, automated testing techniques they use discovering coding errors
and security loopholes in your software
you're operates his own network by inputting invalid or random data. Call fuzz
in our upcoming presentation will be taken. Look at a key takeaway from this particular margin. Almost six.
I look forward to seeing you in a very Lexx video