SlideShare a Scribd company logo
APPLICATION SECURITY :
TREND & ISSUE
By : Dedi Dwianto,CEH,OSCP,eMPAT,ISO 27001:LA
WORKSHOP & TRAINING APPLICATION SECURITY :

OTORITAS JASA KEUANGAN (OJK) 

11-12 Mei 2016
Application Security Trends and Issues
Application Security Trends and Issues
Application Security Trends and Issues
A New Zero-Day Vulnerability Discovered
Each Week
Attackers profit from flaws in
browsers and website plugins
www.symantec.com
Application Security Trends and Issues
WEB ATTACKS, TOOLKITS, AND EXPLOITING
VULNERABILITIES ONLINE
“If web servers are vulnerable, then so are the websites they host
and the people who visit them”
Browser Vulnerabilities
Anual Plugins Vulnerabilities
Anual Plugins Vulnerabilities
Top Five Web Attack Toolkits
DEFACEMENT
zone-h.org
WE LIVE IN AN INCREASING
DIGITAL WORLD
Application Security Trends and Issues
Smartphones are an increasingly attractive target for
online criminals. As a result, they are investing in more
sophisticated attacks that are effective at stealing
valuable personal data or extorting money from victims
IoT
IRISS-Survey-2015
OWASP (OPEN WEB APPLICATION SECURITY PROJECT)OWASP (OPEN WEB APPLICATION SECURITY PROJECT)
The OWASP Top 1010 (a community-driven, 

consensus-based list of top 10 application security risks, 

with lists available for web and mobile applications) 

is by far the leading application security standard or guideline followed by builders
Application Security Trends and Issues
Application Security Trends and Issues
Application Security Trends and Issues
• NOT Network Security
• Securing “custom” code
• Securing libraries
• Securing Backend System
• Securing web & application server
APPLICATION SECURITY
APPLICATION SECURITY
APPLICATION SECURITY PROGRAM
APPLICATION SECURITY PROGRAM
sans.org
Useful SECURITY Practices for Application
Defenders
sans.org
Useful SECURITY Practices for Application
Builders
sans.org
PENETRATION TESTING
TOOLS
By : Dedi Dwianto,C|EH,OSCP,eMPAT,ISO 27001:LA
WORKSHOP & TRAINING APPLICATION SECURITY :

OTORITAS JASA KEUANGAN (OJK) 

11-12 Mei 2016
• System
• Network
• Web Application
TOOLS

More Related Content

PPTX
Tackling today's cyber security challenges - WISER Services & Solutions
PPTX
Protect Yourself Against Today's Cybercriminals and Hackers
PPTX
Cybersecurity Risk Assessment - 'All Done' with WISER
PDF
Website security statistics of 2012
PPTX
Mobile Protect Pro - Powered by Zimperium
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PPTX
Information Security: We are all InfoSec (updated for 2018)
PDF
What are the top 10 web security risks?
Tackling today's cyber security challenges - WISER Services & Solutions
Protect Yourself Against Today's Cybercriminals and Hackers
Cybersecurity Risk Assessment - 'All Done' with WISER
Website security statistics of 2012
Mobile Protect Pro - Powered by Zimperium
Mobile Security: Perceptions vs Device-harvested Reality
Information Security: We are all InfoSec (updated for 2018)
What are the top 10 web security risks?

What's hot (20)

PPTX
CyberCrime - Lse summer school 2010 mg270
PDF
Four Network Security Challenges for the Cloud Generation
PPTX
How to Gather Global Mobile Threat Intelligence
PPTX
Security of internet
PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
PDF
State of Application Security: State of Piracy
PPT
Ibm risk management-30min
PPTX
Exploring the Capabilities and Economics of Cybercrime
PDF
Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
PPTX
Mobile security
PPTX
Security News Bytes March 2020
PPTX
Content Management System Security
PPTX
NewsBytes - Nullhyd
PDF
iOS and Android security: Differences you need to know
PPTX
Bug bounty programs
PPTX
Symantec Website Security Threat Report - Insights
PPTX
Presentatie Kaspersky over Malware trends en statistieken, 26062015
PDF
Documento Cisco su Ransomware: come affrontarlo
PDF
Don’t let Your Website Spread Malware – a New Approach to Web App Security
CyberCrime - Lse summer school 2010 mg270
Four Network Security Challenges for the Cloud Generation
How to Gather Global Mobile Threat Intelligence
Security of internet
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
State of Application Security: State of Piracy
Ibm risk management-30min
Exploring the Capabilities and Economics of Cybercrime
Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
Mobile security
Security News Bytes March 2020
Content Management System Security
NewsBytes - Nullhyd
iOS and Android security: Differences you need to know
Bug bounty programs
Symantec Website Security Threat Report - Insights
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Documento Cisco su Ransomware: come affrontarlo
Don’t let Your Website Spread Malware – a New Approach to Web App Security
Ad

Viewers also liked (20)

PDF
Government Web Application Security: Issues and Challenges - A Case of India
PPTX
Issue with Internet in college (Computer Security and Cyber Law)
PPT
security issue
PDF
The top 10 security issues in web applications
PPTX
Single Sign-On security issue in Cloud Computing
PDF
Journal of Network Security vol 4 issue 3
PPTX
Cybersecurity 4 security is sociotechnical issue
PPT
Big Data (security Issue)
PDF
NSA and PT
PPTX
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
PPTX
Virtual host and certificate authority
PPTX
Networking recap
DOC
Bastion host topologi jaringan
PDF
Curriclum Vitae - Adi Prayitno
PPTX
Setting local domain di virtual host
PDF
Sosialisasi kurikulum 2016
PDF
Presentation Progress TA
PPTX
Trouble shooting windows
PPTX
Network Security Risk
PPTX
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
Government Web Application Security: Issues and Challenges - A Case of India
Issue with Internet in college (Computer Security and Cyber Law)
security issue
The top 10 security issues in web applications
Single Sign-On security issue in Cloud Computing
Journal of Network Security vol 4 issue 3
Cybersecurity 4 security is sociotechnical issue
Big Data (security Issue)
NSA and PT
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Virtual host and certificate authority
Networking recap
Bastion host topologi jaringan
Curriclum Vitae - Adi Prayitno
Setting local domain di virtual host
Sosialisasi kurikulum 2016
Presentation Progress TA
Trouble shooting windows
Network Security Risk
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
Ad

Similar to Application Security Trends and Issues (20)

PDF
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
PDF
En msft-scrty-cntnt-e book-cybersecurity
PDF
2016 Trends in Security
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PDF
20160713 2016 the honeynet projct annual workshop focus and global trends
PDF
Insecure magazine - 52
PDF
State of Application Security Vol. 4
PDF
Research challenges and issues in web security
PDF
Product brochure-print-spread
PPTX
Web Application Security
PDF
Outlook Briefing 2016: Cyber Security
DOCX
Research Paper
PPTX
RSA Europe 2013 OWASP Training
PPTX
Securing the Cloud
PDF
Industrial Threats Landscape, H2'2017
PPTX
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
PPTX
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
PDF
Cisco 2014 Midyear Security Report
PDF
Using Your Network as a Sensor for Enhanced Visibility and Security
PDF
Survey of different Web Application Attacks & Its Preventive Measures
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
En msft-scrty-cntnt-e book-cybersecurity
2016 Trends in Security
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
20160713 2016 the honeynet projct annual workshop focus and global trends
Insecure magazine - 52
State of Application Security Vol. 4
Research challenges and issues in web security
Product brochure-print-spread
Web Application Security
Outlook Briefing 2016: Cyber Security
Research Paper
RSA Europe 2013 OWASP Training
Securing the Cloud
Industrial Threats Landscape, H2'2017
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
Cisco 2014 Midyear Security Report
Using Your Network as a Sensor for Enhanced Visibility and Security
Survey of different Web Application Attacks & Its Preventive Measures

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf

Application Security Trends and Issues