LHSSS-5




    Secure Coding
    Meenu Dogra
    Software Engineer
    www.LearnHackingSecurity.com
About Myself
   Meenu Dogra
   Software Engineer
   Specializes in Secure Coding/Application Development
   Oracle Certified Associate (OCA)
   Speaker – Webinars
   Email : Meenu . Dogra@eCoreTechnoS.com
Internet – World Wide Connectivity

»95.6% people are online right when they wake up
                                      Reading Online
                                          News




                            Online                        Online Banking /
                           Shopping                        Transactions


                                      Internet



                                                   Social Sites –
                                E-mails              Connect
                                                    Everyone's
Business Strategy – Being Online

• Each and every organization now want to be
  online.
  » Online Business Strategy
    • Selling Products Online
    • Online Marketing (Social Websites + Ads)
    • Online Products Analysis


• But it can be a huge Risk for their Business
  » So, Developers need to make a “TRUST OF
    SECURITY”
Security – High Priority

• Online Security is a biggest challenge
  » Developers Issues
    • Operating System Vulnerability
    • Firewall Security Breach
    • Network Security Flaws
    • Intrusion Detection System Vulnerability
    • Application-based Vulnerability
Secure System Development Life Cycle
Secure System Development Life Cycle (SSDLC)




  Requirement
                Design   Implementation   Verification
    Analysis
SSDLC
SSDLC
SSDLC
SSDLC :: Graphical Explanation
SSDLC
LHS Connections and Updates




                    #HackingTechnoS

                                      Get Latest       Facebook
                                      Hacking &
                                                       Security Updates
                                      Security Updates Connect with us
                                      Subscribed on
                                                       Facebook.com/HackingTechn
                    Hands-On Labs     LHS/ePaper       ologies
Resources




      http://www.eCoreTechnoS.com         www.LearnHackingSecurity.com




   http://www.HackingTechnologies.com   http://www.GetHackingSecurity.com

Secure Coding 2013

  • 1.
    LHSSS-5 Secure Coding Meenu Dogra Software Engineer www.LearnHackingSecurity.com
  • 2.
    About Myself  Meenu Dogra  Software Engineer  Specializes in Secure Coding/Application Development  Oracle Certified Associate (OCA)  Speaker – Webinars  Email : Meenu . Dogra@eCoreTechnoS.com
  • 3.
    Internet – WorldWide Connectivity »95.6% people are online right when they wake up Reading Online News Online Online Banking / Shopping Transactions Internet Social Sites – E-mails Connect Everyone's
  • 4.
    Business Strategy –Being Online • Each and every organization now want to be online. » Online Business Strategy • Selling Products Online • Online Marketing (Social Websites + Ads) • Online Products Analysis • But it can be a huge Risk for their Business » So, Developers need to make a “TRUST OF SECURITY”
  • 5.
    Security – HighPriority • Online Security is a biggest challenge » Developers Issues • Operating System Vulnerability • Firewall Security Breach • Network Security Flaws • Intrusion Detection System Vulnerability • Application-based Vulnerability
  • 6.
  • 7.
    Secure System DevelopmentLife Cycle (SSDLC) Requirement Design Implementation Verification Analysis
  • 8.
  • 9.
  • 10.
  • 11.
    SSDLC :: GraphicalExplanation
  • 12.
  • 13.
    LHS Connections andUpdates #HackingTechnoS Get Latest Facebook Hacking & Security Updates Security Updates Connect with us Subscribed on Facebook.com/HackingTechn Hands-On Labs LHS/ePaper ologies
  • 14.
    Resources http://www.eCoreTechnoS.com www.LearnHackingSecurity.com http://www.HackingTechnologies.com http://www.GetHackingSecurity.com

Editor's Notes

  • #6 Here is an example of our approach in action. This is the Koobface attack, which is still active in the wild.Starts as a link to a non-existent video on a malicious site sent via IM, email, or webmail. The first layer of protection is web filtering to block access to the site. If the user clicks on the link, he would receive a phony alert telling him his player is not working, and to download a non-existent new version on a malicious site. By clicking on the “OK” button on the phony Error message, the user is actually instructing his system to install the virus. Antivirus protection would detect the file that the user is trying to install, and block itOnce installed, the worm would try to propagate. The IPS technology would detect the propagation effort, and block it before it could succeed.