SlideShare a Scribd company logo
1 of 4
Respond agree or disagree
Vulnerabilities in system design can be detrimental to any
network, large or small any flaw that can be exploited should
not be taken lightly. Engineers generally assume that
mechanisms serve their intended purpose. Is that always true?
The “smarter” something is, the quicker we lose control and
become fully dependent on it (Trofimova & Hoske, 2016).
A vulnerability I found is a trust assumption and that is when a
designer is aware of a security weakness and determining that a
separate security control would compensate for it. However,
trust assumptions are often implicit, such as creating a feature
without first evaluating the risks it would introduce (Mozilla,
2018). This is something that when designing your system to
not underestimate because as the article stated, these
assumptions are often complicit and don't take every risk into
account which could leave a window open to your system.
Another is always consider the users, this means when
designing your network take into account the people that will be
using it on a daily basis (IEEE, 2014) Every system is different
and complex and therefore requires the designer to know who
his users are. The security stance of a software system is
inextricably linked to what its users do with it. It is therefore
very important that all security-related mechanisms are
designed in a manner that makes it easy to deploy, configure,
use, and update the system securely. Remember, security is not
a feature that can simply be added to a software system, but
rather a property emerging from how the system was built and is
operated (IEEE, 2014).
Trofimova, E., & Hoske, M. T. 1. [email protected] co. (2016).
Retrieved from
https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com
/login.aspx?direct=true&db=aci&AN=117494073&site=ehost-
live&scope=site
Mozilla. (2018). Vulnerabilities. Retrieved
from https://developer.mozilla.org/en-
US/docs/Web/Security/Information_Security_Basics/Vulnerabili
ties
IEEE. (2014). Avoiding the top 10 software security design
flaws. Retrieved
from https://pdfs.semanticscholar.org/b291/be7d567d63dc60043
a8cb1fbbfcfe8d18c83.pdf
Respond agree or disagree
System design vulnerabilities occurs very often and attackers or
exploit hunters are always on the hunt for any opportunities that
are presented. During the process a product is being developed
it is very important to incorporate cybersecurity and quality
control teams. This incorporation has brought a new wave that I
have seen and currently experiencing in my current role,
DevOps. DevOps is a team where Developers and Operations
work together to produce a finished product that has been
through QA and cybersecurity teams have also made
suggestions and participated during the production.
Developers are great at what they do, but often they forfeit
some security best practice to make something on their end
work. Also, the risk of developers to forget, or simply disregard
any input validation through the process could lead to potential
security issues. The software is not the only place where these
vulnerabilities can occur, Product design (Infrastructure design)
can also provide vulnerabilities if controls are not followed.
Software Design Vulnerability
Vulnerabilities are caused because of poor design, configuration
mistakes, inappropriate and insecure coding techniques, the
complexity of software, unchecked user input, and weak
password management. (Kaur, N. & Kaur, P., 2014). With most
of the software offered as a SaaS, potential misconfigurations or
uncheck input validation can lead to various types of attack
such as the ones presented by OWASP. The most common are
SQL Injection, Cross-site scripting (XSS), or an insecure direct
object reference to name a few.
Network Architecture Vulnerability
During product design, Network security can be overlooked and
deem as not necessary, but no network architecture is
completely immune to unwanted intrusion. (INFOSEC INS.,
n.d.) If security is not incorporated during the product design
the network could be left vulnerable and various issues can
originate. Such vulnerabilities include cryptographic
vulnerabilities such as weak encryption, or wrong choice of
encryption, or even unsecured keys. Database vulnerabilities
such as Backup data, unauthorized copying of sensitive data.
Authentication and Access control vulnerabilities that deal with
the escalation of privileges, excessive privileges.
These all have to be taken into consideration when designing a
system and for the finish product design.
Kaur, N. & Kaur P. (2014). Input Validation Vulnerabilities in
Web Applications. Journal of Software Engineering, 8: 116-
126.DOI: 10.3923/jse.2014.116.126
INFOSEC Institute (n.d.). Security Architecture Vulnerabilities
and the CISSP. Retrieved from
https://resources.infosecinstitute.com/category/certifications-
training/cissp/domains/security-engineering/security-
architecture-vulnerabilities/#gref
Respond agree or disagreeVulnerabilities in system design can .docx

More Related Content

Similar to Respond agree or disagreeVulnerabilities in system design can .docx

6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf
6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf
6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf
anilagarwal007
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docx
healdkathaleen
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
IJNSA Journal
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
phanleson
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
aulasnilda
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
croftsshanon
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
CSCJournals
 

Similar to Respond agree or disagreeVulnerabilities in system design can .docx (20)

Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
 
6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf
6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf
6- QUESTION 6 Which of the following is not true for Psychological Acc.pdf
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docx
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
An Introduction to Secure Application Development
An Introduction to Secure Application DevelopmentAn Introduction to Secure Application Development
An Introduction to Secure Application Development
 
How can we predict vulnerabilities to prevent them from causing data losses
How can we predict vulnerabilities to prevent them from causing data lossesHow can we predict vulnerabilities to prevent them from causing data losses
How can we predict vulnerabilities to prevent them from causing data losses
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
Developing secure software using Aspect oriented programming
Developing secure software using Aspect oriented programmingDeveloping secure software using Aspect oriented programming
Developing secure software using Aspect oriented programming
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
 

More from peggyd2

Respond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxRespond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docx
peggyd2
 
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxRespond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
peggyd2
 
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxRespond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docx
peggyd2
 
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxRespond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docx
peggyd2
 
Respond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxRespond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docx
peggyd2
 
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxRESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
peggyd2
 
Respond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxRespond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docx
peggyd2
 
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxRespond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docx
peggyd2
 
Respond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxRespond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docx
peggyd2
 
Respond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxRespond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docx
peggyd2
 
Respond agree or disagree There is still an argument that whet.docx
Respond agree or disagree There is still an argument that whet.docxRespond agree or disagree There is still an argument that whet.docx
Respond agree or disagree There is still an argument that whet.docx
peggyd2
 
Respond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxRespond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docx
peggyd2
 
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxRespond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
peggyd2
 
Respond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxRespond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docx
peggyd2
 
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxRespond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docx
peggyd2
 

More from peggyd2 (20)

Respond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxRespond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docx
 
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxRespond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
 
Respond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docxRespond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docx
 
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxRespond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docx
 
Respond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docxRespond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docx
 
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxRespond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docx
 
Respond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxRespond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docx
 
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxRESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
 
Respond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxRespond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docx
 
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxRespond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docx
 
Respond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxRespond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docx
 
Respond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxRespond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docx
 
Respond agree or disagree There is still an argument that whet.docx
Respond agree or disagree There is still an argument that whet.docxRespond agree or disagree There is still an argument that whet.docx
Respond agree or disagree There is still an argument that whet.docx
 
Respond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxRespond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docx
 
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docxRespiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
 
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docxResource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
 
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxRespond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
 
Respond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxRespond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docx
 
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxRespond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docx
 
Respond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docxRespond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docx
 

Recently uploaded

Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 

Respond agree or disagreeVulnerabilities in system design can .docx

  • 1. Respond agree or disagree Vulnerabilities in system design can be detrimental to any network, large or small any flaw that can be exploited should not be taken lightly. Engineers generally assume that mechanisms serve their intended purpose. Is that always true? The “smarter” something is, the quicker we lose control and become fully dependent on it (Trofimova & Hoske, 2016). A vulnerability I found is a trust assumption and that is when a designer is aware of a security weakness and determining that a separate security control would compensate for it. However, trust assumptions are often implicit, such as creating a feature without first evaluating the risks it would introduce (Mozilla, 2018). This is something that when designing your system to not underestimate because as the article stated, these assumptions are often complicit and don't take every risk into account which could leave a window open to your system. Another is always consider the users, this means when designing your network take into account the people that will be using it on a daily basis (IEEE, 2014) Every system is different and complex and therefore requires the designer to know who his users are. The security stance of a software system is inextricably linked to what its users do with it. It is therefore very important that all security-related mechanisms are designed in a manner that makes it easy to deploy, configure, use, and update the system securely. Remember, security is not a feature that can simply be added to a software system, but rather a property emerging from how the system was built and is operated (IEEE, 2014). Trofimova, E., & Hoske, M. T. 1. [email protected] co. (2016). Retrieved from https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com
  • 2. /login.aspx?direct=true&db=aci&AN=117494073&site=ehost- live&scope=site Mozilla. (2018). Vulnerabilities. Retrieved from https://developer.mozilla.org/en- US/docs/Web/Security/Information_Security_Basics/Vulnerabili ties IEEE. (2014). Avoiding the top 10 software security design flaws. Retrieved from https://pdfs.semanticscholar.org/b291/be7d567d63dc60043 a8cb1fbbfcfe8d18c83.pdf Respond agree or disagree System design vulnerabilities occurs very often and attackers or exploit hunters are always on the hunt for any opportunities that are presented. During the process a product is being developed it is very important to incorporate cybersecurity and quality control teams. This incorporation has brought a new wave that I have seen and currently experiencing in my current role, DevOps. DevOps is a team where Developers and Operations work together to produce a finished product that has been through QA and cybersecurity teams have also made suggestions and participated during the production. Developers are great at what they do, but often they forfeit some security best practice to make something on their end work. Also, the risk of developers to forget, or simply disregard any input validation through the process could lead to potential security issues. The software is not the only place where these vulnerabilities can occur, Product design (Infrastructure design) can also provide vulnerabilities if controls are not followed. Software Design Vulnerability
  • 3. Vulnerabilities are caused because of poor design, configuration mistakes, inappropriate and insecure coding techniques, the complexity of software, unchecked user input, and weak password management. (Kaur, N. & Kaur, P., 2014). With most of the software offered as a SaaS, potential misconfigurations or uncheck input validation can lead to various types of attack such as the ones presented by OWASP. The most common are SQL Injection, Cross-site scripting (XSS), or an insecure direct object reference to name a few. Network Architecture Vulnerability During product design, Network security can be overlooked and deem as not necessary, but no network architecture is completely immune to unwanted intrusion. (INFOSEC INS., n.d.) If security is not incorporated during the product design the network could be left vulnerable and various issues can originate. Such vulnerabilities include cryptographic vulnerabilities such as weak encryption, or wrong choice of encryption, or even unsecured keys. Database vulnerabilities such as Backup data, unauthorized copying of sensitive data. Authentication and Access control vulnerabilities that deal with the escalation of privileges, excessive privileges. These all have to be taken into consideration when designing a system and for the finish product design. Kaur, N. & Kaur P. (2014). Input Validation Vulnerabilities in Web Applications. Journal of Software Engineering, 8: 116- 126.DOI: 10.3923/jse.2014.116.126 INFOSEC Institute (n.d.). Security Architecture Vulnerabilities and the CISSP. Retrieved from https://resources.infosecinstitute.com/category/certifications- training/cissp/domains/security-engineering/security- architecture-vulnerabilities/#gref