• Post category:StudyBullet-13
  • Reading time:5 mins read


Let’s get started debunking a few application security myths that we shouldn’t believe…

What you will learn

Learn about some common application security myths

Get an overview of security issues facing applications

Identify myths that your organization might believe in

Increase the security and quality of your applications

Description

When facing the pressures of scope, budget, and schedule…some application security myths have developed.

There are few things we know about application development and producing system that are secure in the way that they are deployed, operated, and maintained.

We know that:  Writing code is easy…but writing good code is hard

We know that:  Adding security is easy…but finding the right balance between usability, effectiveness, and maintainability is hard

We are always trying to find that balance in development and security…


Get Instant Notification of New Courses on our Telegram channel.


This course is an examination of a just a few myths that result in Fake Security. They contribute to a false sense of security and can sometimes leave your application easily vulnerable to attack.

We’ve tried to keep the lecture short and concise, giving you enough information to start evaluating your own applications and systems.  While the topics covered here can get really deep…very quickly, we’ve tried to keep it at a high level.  This with the hopes that we can reach a broad audience and bring value to managers, project leaders, and developers of all skill levels.

We’ll cover topics like:

  • The Purpose of the OWASP Top Ten List
  • Avoiding Security Through Obscurity
  • Security Responsibilities in the Cloud
  • API Security
  • And more…

Who is this course for:

  • managers
  • project leaders
  • product owners
  • developers of all skill levels

Let’s get started debunking a few myths that we shouldn’t believe…

English
language

Content

Introduction

Introduction
Ethics

Don’t Worry, It’s Not On OWASP’s Top 10 List

The Purpose of the OWASP Top 10

Our Application is Safe – We Use HTTPS

Understanding What HTTPS Protects

Robots.txt Will Disallow Access

Avoiding Security Through Obscurity

We’re Secure – We Use Black Lists

Why White Listing is More Effective

Our Cloud Provider Takes Care of Security

Understanding the Cloud Responsibility Model

Use The Newest Release – It Will Be More Secure

Understanding the Product Security Lifecycle

My API is Behind My Application – So Nobody Can Access It

API Security Considerations

You Don’t Need to Configure It – Just Plug And Play

Insecure Default Configurations

Summary

Conclusion and Thank You