SECURITY IS A PROCESS,
NOT A MAGIC
CAHYO DARUJATI | @idx-incubator
Surabaya, 12 Pebruari 2019
About Me
•AKADEMISI
Dosen Fakultas Ilmu
Komputer Universitas
Narotama.
•PRAKTISI
Corporate Consultant
PT. Piramida Teknologi
Informasi.
INTRODUCTION TO SECURITY
THE ENEMY
“I have just a small Apps*.
Who cares?”
INTRODUCTION TO SECURITY
THE IMPACT
INTRODUCTION TO SECURITY
OUR GOALS
“I have installed a magic*
for security. I’m good.”
SECURITY PRINCIPLES
1. MANAGE SECURITY RISK
http://www.vmwareminds.com
SECURITY PRINCIPLES
2. BE RELUCTANT TO TRUST
Mobile App Security Threats
SECURITY PRINCIPLES
3. PRACTICE DEFENCE IN DEPTH
Application Architecture
SECURITY PRINCIPLES
4. STAY UP TO DATE
IS
WEB APPS
SECURE?
SECURITY PRINCIPLES
5. SECURE THE WEAKEST LINK
RESOURCES
NEXT?
SECURITY & SOFTWARE
✓The Process of Security (Bruce Schneier)
✓The Basics of Web Application Security (Cade Cairns, Daniel
Somerfield)
✓Secure Coding Patterns (Andreas Hallberg)
✓Security is A Process, not a Plugin (Thomas Vitale)
✓OWASP Top 10 Most Critical Web Application Security Risks – 2017
✓Software Security: Building Security In, Gary McGraw
✓Building Secure Software: How to Avoid Security Problems the Right
Way, John Viega and Gary McGraw
SECURITY IS A PROCESS,
NOT A MAGIC
Cahyo Darujati | cahyo@ronar.net
This work is licensed under a Creative Commons Attribution 4.0 International License.
Images source: Pexels

Security is a process not a magic