Jim Harris' Safeguarding Applications from Cyber Attacks
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1. Safeguarding Applications from Cyber Attacks Jim Harris US
Army Signal Corp Non Commissioned Officer, Retired Adobe ColdFusion
Summit 2014
2. Talking Points Credibility Posture Exterior Threats Interior
Access to Data Adobe ColdFusion Summit 2014
3. Credibility 20 Years US Army Signal Corps NATO Level Top
Secret Communications Security Clearance (COMSEC) 15 Years Lead
Programmer Software for Corporate Legal Departments Adobe
ColdFusion Summit 2014
4. Credibility Adobe ColdFusion Summit 2014
5. Credibility Adobe ColdFusion Summit 2014
6. Posture Adobe ColdFusion Summit 2014
7. Exterior Threats Adobe ColdFusion Summit 2014
8. Exterior Threats Adobe ColdFusion Summit 2014
9. Exterior Threats Adobe ColdFusion Summit 2014
10. Adobe ColdFusion Summit 2014
11. Exterior Threats Adobe ColdFusion Summit 2014
12. Exterior Threats Adobe ColdFusion Summit 2014
13. Exterior Threats Adobe ColdFusion Summit 2014
14. Exterior Threats Adobe ColdFusion Summit 2014
15. Exterior Threats Adobe ColdFusion Summit 2014
16. Exterior Threats Adobe ColdFusion Summit 2014
17. Exterior Threats OWASP Top 10 1.Injection 2.Broken
Authentication and Session Management 3.Cross-Site Scripting (XSS)
4.Insecure Direct Object References 5.Security Misconfiguration
6.Sensitive Data Exposure 7.Missing Function Level Access Control
8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known
Vulnerabilities 10.Unvalidated Redirects and Forwards Adobe
ColdFusion Summit 2014
18. Exterior Threats Adobe ColdFusion Summit 2014
19. Exterior Threats Adobe ColdFusion Summit 2014
20. Exterior Threats Adobe ColdFusion Summit 2014
21. Interior Access to Data Adobe ColdFusion Summit 2014