Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Safeguarding applications from cyber attacks

793 views

Published on

Jim Harris' Safeguarding Applications from Cyber Attacks

Published in: Software
  • Be the first to comment

  • Be the first to like this

Safeguarding applications from cyber attacks

  1. 1. Safeguarding Applications from Cyber Attacks Jim Harris US Army Signal Corp Non Commissioned Officer, Retired Adobe ColdFusion Summit 2014
  2. 2. Talking Points • Credibility • Posture • Exterior Threats • Interior Access to Data Adobe ColdFusion Summit 2014
  3. 3. Credibility • 20 Years US Army Signal Corps • NATO Level Top Secret Communications Security Clearance (COMSEC) • 15 Years Lead Programmer Software for Corporate Legal Departments Adobe ColdFusion Summit 2014
  4. 4. Credibility Adobe ColdFusion Summit 2014
  5. 5. Credibility Adobe ColdFusion Summit 2014
  6. 6. Posture Adobe ColdFusion Summit 2014
  7. 7. Exterior Threats Adobe ColdFusion Summit 2014
  8. 8. Exterior Threats Adobe ColdFusion Summit 2014
  9. 9. Exterior Threats Adobe ColdFusion Summit 2014
  10. 10. Adobe ColdFusion Summit 2014
  11. 11. Exterior Threats Adobe ColdFusion Summit 2014
  12. 12. Exterior Threats Adobe ColdFusion Summit 2014
  13. 13. Exterior Threats Adobe ColdFusion Summit 2014
  14. 14. Exterior Threats Adobe ColdFusion Summit 2014
  15. 15. Exterior Threats Adobe ColdFusion Summit 2014
  16. 16. Exterior Threats Adobe ColdFusion Summit 2014
  17. 17. Exterior Threats – OWASP Top 10 1.Injection 2.Broken Authentication and Session Management 3.Cross-Site Scripting (XSS) 4.Insecure Direct Object References 5.Security Misconfiguration 6.Sensitive Data Exposure 7.Missing Function Level Access Control 8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known Vulnerabilities 10.Unvalidated Redirects and Forwards Adobe ColdFusion Summit 2014
  18. 18. Exterior Threats Adobe ColdFusion Summit 2014
  19. 19. Exterior Threats Adobe ColdFusion Summit 2014
  20. 20. Exterior Threats Adobe ColdFusion Summit 2014
  21. 21. Interior Access to Data Adobe ColdFusion Summit 2014
  22. 22. Adobe ColdFusion Summit 2014
  23. 23. Adobe ColdFusion Summit 2014
  24. 24. Adobe ColdFusion Summit 2014
  25. 25. Adobe ColdFusion Summit 2014
  26. 26. Adobe ColdFusion Summit 2014

×