• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
PPT
 

PPT

on

  • 1,351 views

 

Statistics

Views

Total Views
1,351
Views on SlideShare
1,351
Embed Views
0

Actions

Likes
0
Downloads
15
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • CIO.com IT and business executives April, 2008 328 respondents
  • Linus’s Law
  • Written in java Wide range of functionality Used extensively to build and deploy enterprise applications Two to four versions of each project tested Freeware that were not open source excluded
  • Conducted source code analysis on the 11 applications Results reviewed manually to verify findings Responsible disclosure – no detailed vulnerability information These vulnerabilities are the most dangerous and the most easy to detect Across 11 applications, 3 versions each: 44,323 Total Issues 22,828 Cross-Site Scripting 15,612 Sequel Injection
  • Most applications have only gotten worse over the last 3 versions
  • Exceptions Exist: Mozilla Announced a security initiative to improve the browser’s security Hired Independent security consultant, Rich Mogul as advisor
  • Security best practices were a low priority

PPT PPT Presentation Transcript