Top Banner
Safeguarding Applications from Cyber Attacks Jim Harris US Army Signal Corp Non Commissioned Officer, Retired Adobe ColdFusion Summit 2014
27

Safeguarding applications from cyber attacks

Dec 05, 2014

Download

Software

Jim Harris' Safeguarding Applications from Cyber Attacks
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1. Safeguarding Applications from Cyber Attacks Jim Harris US Army Signal Corp Non Commissioned Officer, Retired Adobe ColdFusion Summit 2014
  • 2. Talking Points Credibility Posture Exterior Threats Interior Access to Data Adobe ColdFusion Summit 2014
  • 3. Credibility 20 Years US Army Signal Corps NATO Level Top Secret Communications Security Clearance (COMSEC) 15 Years Lead Programmer Software for Corporate Legal Departments Adobe ColdFusion Summit 2014
  • 4. Credibility Adobe ColdFusion Summit 2014
  • 5. Credibility Adobe ColdFusion Summit 2014
  • 6. Posture Adobe ColdFusion Summit 2014
  • 7. Exterior Threats Adobe ColdFusion Summit 2014
  • 8. Exterior Threats Adobe ColdFusion Summit 2014
  • 9. Exterior Threats Adobe ColdFusion Summit 2014
  • 10. Adobe ColdFusion Summit 2014
  • 11. Exterior Threats Adobe ColdFusion Summit 2014
  • 12. Exterior Threats Adobe ColdFusion Summit 2014
  • 13. Exterior Threats Adobe ColdFusion Summit 2014
  • 14. Exterior Threats Adobe ColdFusion Summit 2014
  • 15. Exterior Threats Adobe ColdFusion Summit 2014
  • 16. Exterior Threats Adobe ColdFusion Summit 2014
  • 17. Exterior Threats OWASP Top 10 1.Injection 2.Broken Authentication and Session Management 3.Cross-Site Scripting (XSS) 4.Insecure Direct Object References 5.Security Misconfiguration 6.Sensitive Data Exposure 7.Missing Function Level Access Control 8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known Vulnerabilities 10.Unvalidated Redirects and Forwards Adobe ColdFusion Summit 2014
  • 18. Exterior Threats Adobe ColdFusion Summit 2014
  • 19. Exterior Threats Adobe ColdFusion Summit 2014
  • 20. Exterior Threats Adobe ColdFusion Summit 2014
  • 21. Interior Access to Data Adobe ColdFusion Summit 2014
  • 22. Adobe ColdFusion Summit 2014
  • 23. Adobe ColdFusion Summit 2014
  • 24. Adobe ColdFusion Summit 2014
  • 25. Adobe ColdFusion Summit 2014
  • 26. Adobe ColdFusion Summit 2014