21
Application Security

Application Security

Embed Size (px)

DESCRIPTION

cissp -> Application Security

Citation preview

Page 1: Application Security

Application Security

Page 2: Application Security

toc

• good and bad

• bad things first

• to be good

• and more

Page 3: Application Security

good and bad

• bad things first

Page 4: Application Security

bad app for

• hobby

• money (trend)

Page 5: Application Security

hobby

• virus

• worm

Page 6: Application Security

virus

• script

• stealth

Page 7: Application Security

money

• tick

• dos

Page 8: Application Security

side of good

• repository

• code

Page 9: Application Security

repository

• database (+warehouse)

• directory service

• expert system

Page 10: Application Security

code

• more than secure coding

Page 11: Application Security

to be good app

• follow the protocol

• based on infra

Page 12: Application Security

cmm

• initial

• repeatable

• defined

• managed

• optimizing

Page 13: Application Security

and more

Page 14: Application Security

process

• needs

• logical design (using UML)

• real design (using UML)

• coding

• test

• implementation & maintenance

• end is near

Page 15: Application Security

database

• DDL, DML

• dictionary

• rollback, commit and checkpoint

• ODBC

Page 16: Application Security

oo

Page 17: Application Security

attack!

• [infra] nos

• [infra] daemon

• code

Page 18: Application Security

attack nos

• icmp - flood, can’t handle (ping of death)

• tcp/ip - same (flag, syn)

Page 19: Application Security

attack daemon

• dns - cache poison (-> dnssec)

• ssh1 - des (-> ssh2 with other cryto)

• openssl (-> patch)

Page 20: Application Security

attack code

• cross-site scripting (XSS)

• SQL injection

Page 21: Application Security

fine