greetings and welcome back the Saw Berries cop Tia certified a van Security Practice Nurse Certification preparation course.
As mentioned earlier. We begin in a brand new module margin almost six, which is titled Security. Element.
These again, the objectives. At this point time, we're going to focus attention upon discussion off the very first objective. We're just title, understand and manage software vulnerabilities.
The title, this particular section and go take a look at is
software vulnerabilities. But before we begin the price of discussing software vulnerabilities, let's engage. First of all, in a short pre assessment quiz.
And the question is as follows
your company has just purchased a Web application.
You've been acts to assess this commercial application for any potential vulnerabilities.
Which approach would be best? Would you do a ah cold with you?
Be a black box assessment, See an audit or D a vulnerable assessment.
If you said like the D, you're absolutely correct because of Otisville. Assessment is the best to to evaluate this commercial product for vulnerabilities.
So now let's turn our text to what discussion of applications security fundamentals.
African security includes measures taken throughout an application lifecycle to prevent exceptions in the security policy of an application or the underlying system.
The primary focus is on layer seven of the Oy Sy model. Now seven is called the application layer.
Now, with the application of the opposite of seven lives with us, our model other words, the open system into connection model
application security should be part of an organization have been a software or software development life cycle.
A key component of Afghan security should be for your developers, and they're managed to be aware of basic application security requirements, common threats and effective count images. Application security knowledge and maturity is significantly lower today than traditional network security.
Let's tear in turn our teacher toward a discussion of some risks that are associated with vulnerable applications. I'm on a mission. A few here. That's listen on this slide here First, all you have unauthorized access to sensitive customer or company data,
theft of sister data to conduct identity theft, credit card fraud or other crimes you also incur in the face of it of red swept your actual websites. Strong potential for brand damage, manipulation of data impacting data, integrity, quality and organizational reputation.
Redirection of your users to malicious website.
What a engaged in fishing or mayor word pipe distribution that now service villa. In other words, we're speaking about available data attack. It's gonna assume Valent uses identity,
also access to hit and Web pages using force. Or we call your L a universal really loss resource located on the words. So this makes a question. What is your software attack surface To assess your applicant security?
Many organizations that do they focus on obvious software issues or the world resource, in other words,
but what happened is they overlook their overall inventory of application and cold from less obvious sources. When they analyzed their assets,
we look at software vulnerability suffered burnt Drona Billy can best be defined, as is a glitch. Ah, flaw, a weakness present and software or in the operating system itself.
Software. Barbell is our explained by three idea factor. These are existence the system of honorable in the software access. Other words, the possibility a hacker can gain access to the vulnerability or explore
the capability of the hacker to take advantage of that bone by V or some type of two off certain type of techniques.
A vulnerable assessment basically is the best to to evaluate this. Any commercial product. Full vulnerabilities gonna be assessment is the price is identifying,
quantified and prioritizing a vulnerable in the system. Avon Be assessment process that is intended to identify threats and the rest they posed typically involve the use of automated testing tools, such as network security scanners whose results unlisted and vulnerability Assessment reports
We have escalation of privilege.
This occurs when court runs with higher purpose than that off the user who executed
privilege as a case. Include vertical purpose escalation or hards on a privilege escalation
when we look at vertical privilege escalation a lower prefers user or application access functions or content reserved for high privilege users or application. When you look at it hard on a privilege escalation on at A at a normal use excess functions or content reserved for another
we also have system vulnerable, not just admitting software. Vulnerability is a cybersecurity term that refers to a Florida system that can leave it open to an attack. A volume It may well be referred to any type of weakness in the computer itself. In a set of procedure or anything that leaves in Frisco, it exposed to a threat.
So during this presentation, we discuss a software vulnerabilities, a glitch, floor weakness, president software. We also discussed a vulnerability is a cybersecurity term that refers to a Florida system and leaves it open to attack. We learned that a bomb, but it may also refer to a type of weakness and your computer system itself.
We learned also that somewhere farmers are explained by three idea factors. Existed.
Access as well as exports
in our upcoming presentation will be discussing a lit bit more detail discussing software vulnerabilities, which is section number to look forward to seeing you in next