OWASP Plan - Strawman
Application Security
OWASP
31-07-July
Jamuna Swamy Speaker Hexaware Technologies jamunas@ 9790997743
Copyright ? The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.
The OWASP Foundation
Application Security Agenda
Threats Landscape Application Threats Survey Samples Secure SDLC Process Security _ Non functional requirements Mitigation Awareness Level Role of OWASP
OWASP
2
Threats Landscape
Non availability of resources, Data integrity loss, loss of confidentiality of sensitive information
Attack can be directly on to the information Attack can be through application vulnerability Attack can be internal Attack can be from outside Attack can be compromising the IT infrastructure Attack due to Natural Disaster/Man made disaster
OWASP
3
Application Threats
Social Engineering Non segregation of Duties Improper Control Validation Improper coding Improper Security Testing Non availability/ non execution of
compensating controls
OWASP
4
Confidence in house developed applications
OWASP
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- functional versus non functional vmware
- functional and security requirements
- design of non functional requirement security using security ijert
- owasp plan strawman
- non functional requirements university of texas at dallas
- addressing non functional requirements in mobile apps
- xiv non functional requirements
- appendix j—ccms data exchange non functional requirements california
- introduction to non functional requirements on a web application kth
- seg3101 ch3 4 non functional requirements qualities