SlideShare a Scribd company logo
1 of 12
Download to read offline
Brought to you by
❖Next event: May 2018 (TBD)
❖Application UX and Front-End Design
SOFTWARE SECURITY 101
❖ sponsored by:
Srinivasan Vanamali,
Olympus Infotech
Bilal Soylu,
Xcobee
Kate Kliebert,
Kliebert Law
Ben Wilson,
deliverypath
Meet the panel of experts
From An Idea to The Killer App
❖Idea
❖Validate it with Business Partners,
potential clients, colleagues & friends
❖Define the Requirements
❖Develop the App
❖Ready to go!
Typical Application Architectural Components:
Typical Mistakes: Client Tier
❖Issues in separation of Public / Private areas of the application
❖Some of the application resources that meant to be private get
exposed to the public
❖Authorization - issues in user rights
❖The user roles get messed up - wrong type of users get access to
the resources that they should not to
❖Securing Credentials
❖User credentials are stored & passed as CLEAR TEXT
Typical Mistakes: Web Tier
❖Data gets transferred through the INTERNET -
unprotected area
❖The connection is not encrypted
➢HTTP instead of HTTPS is used
➢Old and vulnerable versions of SSL/TLS are used
❖Other Vulnerabilities
Typical Mistakes: Web Tier❖No breaches monitoring for the software
installed on the servers
❖Common Software Vulnerabilities get
overlooked
❖The Server Software is not updated
promptly after the vulnerabilities get
discovered
❖I.e. 9 pages of vulnerabilities for Apache on
the screenshot:
Typical Mistakes: App Tier
❖Source Code Management
❖Public repositories instead of private
❖Access rights to the source code are not
managed
❖Developers do not have clear
understanding on what project they are
working on
❖Vulnerability in the code
❖Not following the best practices
❖Not following “Security by design” pattern
❖Not storing API keys securely
❖Breaches in the third-party components
and libraries
Typical Mistakes: Data Tier
❖Non-securing sensitive data (PII - personal
identifiable information: Name, Address, Date of
Birth, SSN, etc)
❖Storing data when you do not need to (i.e.
credit card data - very often!)
❖Not following the Regulatory Compliance when
needed:
❖PCI (credit card data)
❖HIPAA (medical data)
❖GDPR (when operating in EU)
❖etc
❖Not following right coding standards when
communicating with database
❖SQL injections possibility
❖Physical Server Security
❖Other vulnerabilities
Typical Mistakes: Team Collaboration Tools
❖Use of public team collaboration tools by
unexperienced users
❖Not enough training for the employees
❖Accidentally sharing information that is not
supposed to (i.e. everyone with the link can
open the google doc or DropBox document)
❖The users who are not employees any
more still have access
❖etc
Typical Mistakes: Third-Party Software
❖Opting for free software without checking for security
breaches & examining the code thoroughly
❖Not validating the vendors of third-party software (i.e.
when choosing payment processing gateway - is credit
card data going to be safe with that vendor?)
Resources
❖Common Vulnerabilities and Exposures
➢https://cve.mitre.org/
➢https://nvd.nist.gov/
❖https://www.us-cert.gov/
❖https://www.xcoobee.com/breach-cost-calculator/
❖https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-
breaches-of-the-21st-century.html

More Related Content

What's hot

Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
Peter Henley
 

What's hot (12)

Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
 
Carver-IT Security for Librarians
Carver-IT Security for LibrariansCarver-IT Security for Librarians
Carver-IT Security for Librarians
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Basic of Information Security
Basic of Information SecurityBasic of Information Security
Basic of Information Security
 
Ayala mar23
Ayala mar23Ayala mar23
Ayala mar23
 
MG Resume 2017
MG Resume 2017MG Resume 2017
MG Resume 2017
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Nhs dealing with cyber threat
Nhs dealing with cyber threatNhs dealing with cyber threat
Nhs dealing with cyber threat
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Shadow it risks & control managing the unknown unknowns in the deep &...
Shadow it risks & control managing the unknown unknowns in the deep &...Shadow it risks & control managing the unknown unknowns in the deep &...
Shadow it risks & control managing the unknown unknowns in the deep &...
 

Similar to TechTalks | Software Security 101: What Every Startup Needs to Know to Protect Their Business

Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
Denim Group
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
UltraUploader
 

Similar to TechTalks | Software Security 101: What Every Startup Needs to Know to Protect Their Business (20)

Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

TechTalks | Software Security 101: What Every Startup Needs to Know to Protect Their Business

  • 1. Brought to you by ❖Next event: May 2018 (TBD) ❖Application UX and Front-End Design
  • 2. SOFTWARE SECURITY 101 ❖ sponsored by: Srinivasan Vanamali, Olympus Infotech Bilal Soylu, Xcobee Kate Kliebert, Kliebert Law Ben Wilson, deliverypath Meet the panel of experts
  • 3. From An Idea to The Killer App ❖Idea ❖Validate it with Business Partners, potential clients, colleagues & friends ❖Define the Requirements ❖Develop the App ❖Ready to go!
  • 5. Typical Mistakes: Client Tier ❖Issues in separation of Public / Private areas of the application ❖Some of the application resources that meant to be private get exposed to the public ❖Authorization - issues in user rights ❖The user roles get messed up - wrong type of users get access to the resources that they should not to ❖Securing Credentials ❖User credentials are stored & passed as CLEAR TEXT
  • 6. Typical Mistakes: Web Tier ❖Data gets transferred through the INTERNET - unprotected area ❖The connection is not encrypted ➢HTTP instead of HTTPS is used ➢Old and vulnerable versions of SSL/TLS are used ❖Other Vulnerabilities
  • 7. Typical Mistakes: Web Tier❖No breaches monitoring for the software installed on the servers ❖Common Software Vulnerabilities get overlooked ❖The Server Software is not updated promptly after the vulnerabilities get discovered ❖I.e. 9 pages of vulnerabilities for Apache on the screenshot:
  • 8. Typical Mistakes: App Tier ❖Source Code Management ❖Public repositories instead of private ❖Access rights to the source code are not managed ❖Developers do not have clear understanding on what project they are working on ❖Vulnerability in the code ❖Not following the best practices ❖Not following “Security by design” pattern ❖Not storing API keys securely ❖Breaches in the third-party components and libraries
  • 9. Typical Mistakes: Data Tier ❖Non-securing sensitive data (PII - personal identifiable information: Name, Address, Date of Birth, SSN, etc) ❖Storing data when you do not need to (i.e. credit card data - very often!) ❖Not following the Regulatory Compliance when needed: ❖PCI (credit card data) ❖HIPAA (medical data) ❖GDPR (when operating in EU) ❖etc ❖Not following right coding standards when communicating with database ❖SQL injections possibility ❖Physical Server Security ❖Other vulnerabilities
  • 10. Typical Mistakes: Team Collaboration Tools ❖Use of public team collaboration tools by unexperienced users ❖Not enough training for the employees ❖Accidentally sharing information that is not supposed to (i.e. everyone with the link can open the google doc or DropBox document) ❖The users who are not employees any more still have access ❖etc
  • 11. Typical Mistakes: Third-Party Software ❖Opting for free software without checking for security breaches & examining the code thoroughly ❖Not validating the vendors of third-party software (i.e. when choosing payment processing gateway - is credit card data going to be safe with that vendor?)
  • 12. Resources ❖Common Vulnerabilities and Exposures ➢https://cve.mitre.org/ ➢https://nvd.nist.gov/ ❖https://www.us-cert.gov/ ❖https://www.xcoobee.com/breach-cost-calculator/ ❖https://www.csoonline.com/article/2130877/data-breach/the-biggest-data- breaches-of-the-21st-century.html