SlideShare a Scribd company logo
Secure Software Presenter: Bhavya Siddappa
Agenda Why security? Terms used STRIDE Response to threats Mitigation
Why security? There are some malignant users in the world They can extract valuable information from system and misuse it They can shut down the server for fun They can make the system behave abnormally They can enter unwanted information or incorrect information in the system They can flood the database with a lot of data They do it just for fun Your system can be next victim The trouble to fix the problem would be too much after it is hacked The data loss could be painful Customer satisfaction is affected along with your goodwill
Terms Threats: The potential event that can cause unwelcome outcome are threats. Vulnerabilities: the weakness (code bug, design flaw) in the system is called vulnerability  Attack: when an attacker takes advantage of the vulnerability with a motive
STRIDE Spoofing of identity Using another users authentication by illegal access Tampering with data Malicious modification of data in database or data in transit Repudiation A user can deny performing an action w/o proof Information disclosure Access to information that is not supposed to be accessed by a user or to data in transit Denial of service Deny service to valid users Elevation of privileges Unprivileged user can get privileged access
Response to threats Do nothing Inform the user of threat Remove the problem Fix the problem
Mitigation Spoofing identity Authentication Protect secrets Don’t store secrets
Mitigation Tampering with Data Authorization Hashes (cryptographic function) Message authentication codes Digital signatures Tamper resistant protocols
Mitigation Repudiation Digital signatures Timestamps Audit trails
Mitigation Information disclosure Authorization Privacy-enhanced protocols Encryption Protect secrets Don’t store secrets
Mitigation Denial of service Authentication Authorization Filtering  before accepting the data Throttling  Limiting no of requests to the system Quality of service Preference to specific traffic e.g. streaming media
Mitigation Elevation of privileges Run with least privilege
Thank You

More Related Content

PDF
The three chain links of radius security
PPT
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
PPT
Its Ok To Get Hacked
DOCX
accuracy-constrained privacy preserving access control mechanism for relation...
PPTX
Overview of RateSetter web security
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
PPTX
Logs in Security and Compliance flare
PPTX
DBMS SECURITY
The three chain links of radius security
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
Its Ok To Get Hacked
accuracy-constrained privacy preserving access control mechanism for relation...
Overview of RateSetter web security
Accuracy constrained privacy-preserving access control mechanism for relation...
Logs in Security and Compliance flare
DBMS SECURITY

What's hot (20)

PDF
Chapter 3 security principals
PPT
Webhawk as-software
PDF
O365Con18 - Threat Modeling for SharePoint - Ivan Vagunin
PDF
OWASP Top 10 List Overview for Web Developers
PPTX
Database security
PDF
55994241 cissp-cram
PPTX
Website Security
PDF
Smarsh Email Encryption - Presented by Atidan
PPTX
Content filters presentation
PPT
Biometrics
PPTX
what is data security full ppt
PPTX
Database security
PPT
Security Software
PPTX
What is penetration testing and why is it important for a business to invest ...
PDF
Database security
PPTX
Database security and privacy
PDF
Get your Enterprise Ready for GDPR
PDF
Database Security
PPTX
Database Security Management
Chapter 3 security principals
Webhawk as-software
O365Con18 - Threat Modeling for SharePoint - Ivan Vagunin
OWASP Top 10 List Overview for Web Developers
Database security
55994241 cissp-cram
Website Security
Smarsh Email Encryption - Presented by Atidan
Content filters presentation
Biometrics
what is data security full ppt
Database security
Security Software
What is penetration testing and why is it important for a business to invest ...
Database security
Database security and privacy
Get your Enterprise Ready for GDPR
Database Security
Database Security Management
Ad

Viewers also liked (8)

PPT
eLearning 2.0
PPT
GTUG Intro
PPT
Introduction To REST
PDF
Mobile World Congress 2011 Overview
PPT
8 C's of Mobile EcoSystem
PPT
Women in Technology
PDF
Google Io Introduction To Android
PPTX
Graphology: Art of knowing a character
eLearning 2.0
GTUG Intro
Introduction To REST
Mobile World Congress 2011 Overview
8 C's of Mobile EcoSystem
Women in Technology
Google Io Introduction To Android
Graphology: Art of knowing a character
Ad

Similar to Secure Software (20)

PDF
Web application security (eng)
PPTX
Week 01 - Cryptography and Network Security.pptx
PPT
CompTIA Security+ Module1: Security fundamentals
PPTX
julietpreesentationonthe incident analysis.pptx
PDF
Health Information Privacy and Security
PPT
OPERATING SYSTEM
PDF
Information Security Awareness Deck and Training
PPT
Defensive information warfare
PPTX
OWASP_Training.pptx
PPTX
the incidence analysis presentation part two
PPT
Technical seminar on Security
PPT
Security communication
PPT
Objective 5 legal consideration in NIS.ppt
PDF
InsiderThreat-2016NDITS
PPTX
Introduction to information security
PDF
Pertemuan 14 keamanan sistem operasi
PPTX
Website security
PPT
Software Security Testing
PDF
5db-security.pdf
PPT
DB security
Web application security (eng)
Week 01 - Cryptography and Network Security.pptx
CompTIA Security+ Module1: Security fundamentals
julietpreesentationonthe incident analysis.pptx
Health Information Privacy and Security
OPERATING SYSTEM
Information Security Awareness Deck and Training
Defensive information warfare
OWASP_Training.pptx
the incidence analysis presentation part two
Technical seminar on Security
Security communication
Objective 5 legal consideration in NIS.ppt
InsiderThreat-2016NDITS
Introduction to information security
Pertemuan 14 keamanan sistem operasi
Website security
Software Security Testing
5db-security.pdf
DB security

More from Bhavya Siddappa (10)

PPT
Huawei Club - Community Activity & Student Program
PPTX
Android Introduction 2013
PPTX
Mobile Cloud Computing 2012
PPTX
Windows Phone 7 Architecture Overview
PPT
Android Anatomy
PPT
JavaScript Misunderstood
PPT
Apache Velocity
PPT
Idea Camp Knowledge Is Power
PPT
Idea Camp Idea Framework
Huawei Club - Community Activity & Student Program
Android Introduction 2013
Mobile Cloud Computing 2012
Windows Phone 7 Architecture Overview
Android Anatomy
JavaScript Misunderstood
Apache Velocity
Idea Camp Knowledge Is Power
Idea Camp Idea Framework

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A comparative analysis of optical character recognition models for extracting...
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx

Secure Software

  • 1. Secure Software Presenter: Bhavya Siddappa
  • 2. Agenda Why security? Terms used STRIDE Response to threats Mitigation
  • 3. Why security? There are some malignant users in the world They can extract valuable information from system and misuse it They can shut down the server for fun They can make the system behave abnormally They can enter unwanted information or incorrect information in the system They can flood the database with a lot of data They do it just for fun Your system can be next victim The trouble to fix the problem would be too much after it is hacked The data loss could be painful Customer satisfaction is affected along with your goodwill
  • 4. Terms Threats: The potential event that can cause unwelcome outcome are threats. Vulnerabilities: the weakness (code bug, design flaw) in the system is called vulnerability Attack: when an attacker takes advantage of the vulnerability with a motive
  • 5. STRIDE Spoofing of identity Using another users authentication by illegal access Tampering with data Malicious modification of data in database or data in transit Repudiation A user can deny performing an action w/o proof Information disclosure Access to information that is not supposed to be accessed by a user or to data in transit Denial of service Deny service to valid users Elevation of privileges Unprivileged user can get privileged access
  • 6. Response to threats Do nothing Inform the user of threat Remove the problem Fix the problem
  • 7. Mitigation Spoofing identity Authentication Protect secrets Don’t store secrets
  • 8. Mitigation Tampering with Data Authorization Hashes (cryptographic function) Message authentication codes Digital signatures Tamper resistant protocols
  • 9. Mitigation Repudiation Digital signatures Timestamps Audit trails
  • 10. Mitigation Information disclosure Authorization Privacy-enhanced protocols Encryption Protect secrets Don’t store secrets
  • 11. Mitigation Denial of service Authentication Authorization Filtering before accepting the data Throttling Limiting no of requests to the system Quality of service Preference to specific traffic e.g. streaming media
  • 12. Mitigation Elevation of privileges Run with least privilege

Editor's Notes

  • #2: Title slide The title slide is available as a ‘title master’ where the corporate signature is fixed. Pre-formatted placeholders are set into the master for editable text. Type in your title which is set in Arial 24pt. Slides should be used only as a prompt for the presenter. Header and Footers Placeholders for these have been inserted into the masters, and have been set to the same colour as the background (white). They are only apparent when printing black and white. They enable you to identify: 1. Slide or page number, 2. A copyright symbol, DeLaval endorsement and year, 3. A unique presentation reference name /job number. 4. Day / time reference. Go to View then Headers and Footers. They can be turned on and off by the tick boxes. Type in your name / job reference etc in field indicated after the © DeLaval and year.