SlideShare a Scribd company logo
Application Security
Fundamentals
PART 1
Agenda
PART 1
 The Threats
 Goals and Principles of Application Security
PART 2
 Security Mechanisms
Application Security Threats
Script Kiddie
• Leveraging tools and exploits created by others
• Hacking by pushing the big red shiny button
Hacktivist
• Hacker with a cause
• Denial of service, site defacement
Hacker
• Malicious and non-malicious
• Because they can
Cyber Criminal
• Different levels of sophistication
• Scams, information theft, fraud
Advanced Persistent Threat
• Extremely sophisticated attackers; nation-states
• Low & slow, information theft, espionage
Application Security Goals
onfidentiality
ntegrity
vailability
Information is only available to
those who should have access
Data is known to be correct and
trusted
Information is available for use by
legitimate users when it is needed
Application Security Hierarchy
guiding concepts that aid in
making security decisions
Confidentiality
Integrity
Availability
Goals
Mechanisms
Principles
secure coding techniques

More Related Content

PPTX
Ethical Hacking
PDF
Cyber intelligence-services
PDF
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
PDF
Security in computer systems fundamentals
PDF
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PPTX
Cyber Security For E-commerce (Infrastructure) development
PPT
Introduction To Ethical Hacking
PPT
Ethical hacking
Ethical Hacking
Cyber intelligence-services
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Security in computer systems fundamentals
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Cyber Security For E-commerce (Infrastructure) development
Introduction To Ethical Hacking
Ethical hacking

What's hot (20)

PPTX
Ethical hacking
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
PPTX
PPT
Information security
PPTX
IoT Security
PPTX
Introduction to ethical hacking
PPTX
Computer network
PPTX
Ethical Hacking Tools & Techniques
PPTX
Ethical hacking
PPT
Data privacy & data governance
PDF
Cyber Intelligence Vision Information Sheet 20Nov2013
PPTX
Cybercrime
PPTX
Introduction to Ethical Hacking
PPTX
ethical hacking
PPTX
Ethical Hacking Overview
PPTX
Types of attacks
PPT
Burns Sheehan Security Event
PDF
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
PPTX
Ethical hacking
PPTX
Etical hacking
Ethical hacking
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Information security
IoT Security
Introduction to ethical hacking
Computer network
Ethical Hacking Tools & Techniques
Ethical hacking
Data privacy & data governance
Cyber Intelligence Vision Information Sheet 20Nov2013
Cybercrime
Introduction to Ethical Hacking
ethical hacking
Ethical Hacking Overview
Types of attacks
Burns Sheehan Security Event
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Ethical hacking
Etical hacking
Ad

Similar to 01 Application Security Fundamentals - part 1 - introduction and goals (20)

PPTX
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Cloud Security.pptx
PPTX
Digital literacy lecture 2 data security.pptx
PDF
Intrusion in computing
PDF
Cyber+Security+Fundamentals.pdf.....network security
PPTX
Ethical_Hacking engineeringsecond yr.pptx
PPTX
Ethical Hacking
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Concept-And-Scope-of-Ethical-Hacking.pptx
PPTX
Concept-And-Scope-of-Ethical-Hacking.pptx
PPTX
chapitre 1 introduction to ethical hakcing.pptx
PPTX
Cyber security for engg students and diploma
PPTX
IAEM cybersecurity 101
PPTX
cybersecurity notes important points.pptx
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PPTX
A single oversight could wipe out your data reserves
PPTX
Week 1 - Introduction to CyberSecurity.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
Lec 1- Intro to cyber security and recommendations
Cloud Security.pptx
Digital literacy lecture 2 data security.pptx
Intrusion in computing
Cyber+Security+Fundamentals.pdf.....network security
Ethical_Hacking engineeringsecond yr.pptx
Ethical Hacking
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security Awareness Session for Executives and Non-IT professionals
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
chapitre 1 introduction to ethical hakcing.pptx
Cyber security for engg students and diploma
IAEM cybersecurity 101
cybersecurity notes important points.pptx
Cyber security.pptxelectronic systems, networks, and data from malicious
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
A single oversight could wipe out your data reserves
Week 1 - Introduction to CyberSecurity.pptx
Ad

More from appsec (12)

PPTX
23 owasp top 10 - resources
PPTX
15 owasp top 10 - a3-xss
PPTX
12 owasp top 10 - introduction
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
11 application security fundamentals - part 2 - security mechanisms - summary
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
04 application security fundamentals - part 2 - security mechanisms - authe...
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PPTX
02 application security fundamentals - part 1 - security priciples
23 owasp top 10 - resources
15 owasp top 10 - a3-xss
12 owasp top 10 - introduction
10 application security fundamentals - part 2 - security mechanisms - encry...
11 application security fundamentals - part 2 - security mechanisms - summary
09 application security fundamentals - part 2 - security mechanisms - logging
08 application security fundamentals - part 2 - security mechanisms - error...
06 application security fundamentals - part 2 - security mechanisms - sessi...
07 application security fundamentals - part 2 - security mechanisms - data ...
04 application security fundamentals - part 2 - security mechanisms - authe...
05 application security fundamentals - part 2 - security mechanisms - autho...
02 application security fundamentals - part 1 - security priciples

Recently uploaded (20)

PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
E -tech empowerment technologies PowerPoint
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Internet___Basics___Styled_ presentation
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPT
tcp ip networks nd ip layering assotred slides
PDF
Introduction to the IoT system, how the IoT system works
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Module 1 - Cyber Law and Ethics 101.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Introuction about WHO-FIC in ICD-10.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
E -tech empowerment technologies PowerPoint
SAP Ariba Sourcing PPT for learning material
Power Point - Lesson 3_2.pptx grad school presentation
An introduction to the IFRS (ISSB) Stndards.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Internet___Basics___Styled_ presentation
international classification of diseases ICD-10 review PPT.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
The Internet -By the Numbers, Sri Lanka Edition
WebRTC in SignalWire - troubleshooting media negotiation
tcp ip networks nd ip layering assotred slides
Introduction to the IoT system, how the IoT system works
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...

01 Application Security Fundamentals - part 1 - introduction and goals

  • 2. Agenda PART 1  The Threats  Goals and Principles of Application Security PART 2  Security Mechanisms
  • 3. Application Security Threats Script Kiddie • Leveraging tools and exploits created by others • Hacking by pushing the big red shiny button Hacktivist • Hacker with a cause • Denial of service, site defacement Hacker • Malicious and non-malicious • Because they can Cyber Criminal • Different levels of sophistication • Scams, information theft, fraud Advanced Persistent Threat • Extremely sophisticated attackers; nation-states • Low & slow, information theft, espionage
  • 4. Application Security Goals onfidentiality ntegrity vailability Information is only available to those who should have access Data is known to be correct and trusted Information is available for use by legitimate users when it is needed
  • 5. Application Security Hierarchy guiding concepts that aid in making security decisions Confidentiality Integrity Availability Goals Mechanisms Principles secure coding techniques