• About Us
    • Contact Us
    • Write for US
  • Terms
    • Newsletter
    • Affiliate Link Policy
    • DMCA
  • Privacy
  • Forums
    • African History
    • African Walk of Fame
  • Nyosake Ltd
    • Car Head
    • Business Today
    • Android News
    • Afrobays
    • The Sun
    • NS Sports
    • PodCast
    • Gadget
    • Travel
    • Play IT
    • Invest News
    • Start A Blog Easily Here
  • Advertise
Monday, August 8, 2022
Ask Anything
  • News
    • Africa
      • Uganda
      • East African Community
    • African Inventions
    • African History
    • Qatar
    • Quotes
    • Politics
    • Counties
      • Mega Projects in Kenya
    • National
    • Health
    • Family
  • How To
    • Made In Africa
    • Education
    • Facts
    • Science
  • Business
    • Sponsored
    • Manufacturing
    • Real Estate
    • Forex
    • World Billionaires
    • Finance
    • Wealth
    • Bank Swift Codes
    • Affiliate
    • PayPal
    • Cryptocurrency
    • Advertisement
  • Apple
    • iPad
    • Artists
    • iPhone
    • Apple Watch
    • Mac Specs
    • Apple TV
  • Windows
    • Windows 10
    • Surface
    • PC Components
    • Laptops
    • ChromeBooks
  • Tech
    • Tech Terms
    • Phones
    • Phone Rumors
    • Android News
    • Top Deals
    • Gadget Reviews
    • Gift Guides
    • VPN
  • Autos
    • Car Showrooms
    • Electric Vehicle
    • Petrol Stations
    • Car News
    • Latest Cars
    • Auto Sport
    • Car Facts
  • Top 100
    • Business Directory
  • Sports
    • Soccer LiveScores
    • Basketball Scores
    • WRC Safari Rally
  • Entertainment
    • Celebrities
    • Lyrics
    • Theaters
    • Artists
    • Biography
  • HSE
    • Hazards
    • NEBOSH
    • IOSH
    • Construction Safety
    • General Industry
    • Oil & Gas Safety
    • All Safety Courses
  • Forums
    • Ask Anything
No Result
View All Result
  • News
    • Africa
      • Uganda
      • East African Community
    • African Inventions
    • African History
    • Qatar
    • Quotes
    • Politics
    • Counties
      • Mega Projects in Kenya
    • National
    • Health
    • Family
  • How To
    • Made In Africa
    • Education
    • Facts
    • Science
  • Business
    • Sponsored
    • Manufacturing
    • Real Estate
    • Forex
    • World Billionaires
    • Finance
    • Wealth
    • Bank Swift Codes
    • Affiliate
    • PayPal
    • Cryptocurrency
    • Advertisement
  • Apple
    • iPad
    • Artists
    • iPhone
    • Apple Watch
    • Mac Specs
    • Apple TV
  • Windows
    • Windows 10
    • Surface
    • PC Components
    • Laptops
    • ChromeBooks
  • Tech
    • Tech Terms
    • Phones
    • Phone Rumors
    • Android News
    • Top Deals
    • Gadget Reviews
    • Gift Guides
    • VPN
  • Autos
    • Car Showrooms
    • Electric Vehicle
    • Petrol Stations
    • Car News
    • Latest Cars
    • Auto Sport
    • Car Facts
  • Top 100
    • Business Directory
  • Sports
    • Soccer LiveScores
    • Basketball Scores
    • WRC Safari Rally
  • Entertainment
    • Celebrities
    • Lyrics
    • Theaters
    • Artists
    • Biography
  • HSE
    • Hazards
    • NEBOSH
    • IOSH
    • Construction Safety
    • General Industry
    • Oil & Gas Safety
    • All Safety Courses
  • Forums
    • Ask Anything
No Result
View All Result
No Result
View All Result

Application security

July 9, 2022
in Technology
Reading Time: 4 mins read
A A
ShareTweetShareShareScanEmail
ADVERTISEMENT
Advertisements

Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security issues within applications. It encompasses the whole application life cycle from requirements analysis, design, implementation, verification as well as maintenance.

Approaches

Different approaches will find different subsets of the security vulnerabilities lurking in an application and are most effective at different times in the software lifecycle. They each represent different tradeoffs of time, effort, cost and vulnerabilities found.

  • Design review. Before code is written the application’s architecture and design can be reviewed for security problems. A common technique in this phase is the creation of a threat model.
  • Whitebox security review, or code review. This is a security engineer deeply understanding the application through manually reviewing the source code and noticing security flaws. Through comprehension of the application, vulnerabilities unique to the application can be found.
  • Blackbox security audit. This is only through the use of an application testing it for security vulnerabilities, no source code is required.
  • Automated Tooling. Many security tools can be automated through inclusion into the development or testing environment. Examples of those are automated DAST/SAST tools that are integrated into code editor or CI/CD platforms.
  • Coordinated vulnerability platforms. These are hacker-powered application security solutions offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs.

Web application security

Web application security is a branch of information security that deals specifically with the security of websites, web applications and web services. At a high level, web application security draws on the principles of application security but applies them specifically to internet and web systems.

ADVERTISEMENT

Web Application Security Tools are specialized tools for working with HTTP traffic, e.g., Web application firewalls.

Security threats

The Open Web Application Security Project (OWASP) provides free and open resources. It is led by a non-profit called The OWASP Foundation. The OWASP Top 10 – 2017 is the published result of recent research based on comprehensive data compiled from over 40 partner organizations. From this data, approximately 2.3 million vulnerabilities were discovered across over 50,000 applications. According to the OWASP Top 10 – 2021, the ten most critical web application security risks include:

ADVERTISEMENT
  1. Broken access control
  2. Cryptographic Failures
  3. Injection
  4. Insecure Design
  5. Security Misconfiguration
  6. Vulnerable and Outdated Components
  7. Identification and Authentification Failures
  8. Software and Data Integrity Failures
  9. Security Logging and Monitoring Failures*
  10. Server-Side Request Forgery (SSRF)*

Tooling for security testing

Security testing techniques scour for vulnerabilities or security holes in applications. These vulnerabilities leave applications open to exploitation. Ideally, security testing is implemented throughout the entire Software Development Life Cycle (SDLC) so that vulnerabilities may be addressed in a timely and thorough manner.

There are many kinds of automated tools for identifying vulnerabilities in applications. Common tool categories used for identifying application vulnerabilities include:

  • Static Application Security Testing (SAST) analyzes source code for security vulnerabilities during an application’s development. Compared to DAST, SAST can be utilized even before the application is in an executable state. As SAST has access to the full source code it is a white-box approach. This can yield more detailed results but can result in many false positives that need to be manually verified.
  • Dynamic Application Security Testing (DAST, often called Vulnerability scanners) automatically detects vulnerabilities by crawling and analyzing websites. This method is highly scalable, easily integrated and quick. DAST tools are well suited for dealing with low-level attacks such as injection flaws but are not well suited to detect high-level flaws, e.g., logic or business-logic flaws. Fuzzing, tools are commonly used for input testing.
  • Interactive Application Security Testing (IAST) assesses applications from within using software instrumentation. This combines the strengths of both SAST and DAST methods as well as providing access to code, HTTP traffic, library information, backend connections and configuration information. Some IAST products require the application to be attacked, while others can be used during normal quality assurance testing.
  • Runtime application self-protection augments existing applications to provide intrusion detection and prevention from within an application runtime.
  • Dependency scanners (also called Software Composition Analysis) try to detect the usage of software components with known vulnerabilities. These tools can either work on-demand, e.g., during the source code build process, or periodically.
  • Abstraction is the idea of making more complex things less complex.

Security standards and regulations

  • CERT Secure Coding
  • ISO/IEC 27034-1:2011 Information technology — Security techniques — Application security — Part 1: Overview and concepts
  • ISO/IEC TR 24772:2013 Information technology — Programming languages — Guidance to avoiding vulnerabilities in programming languages through language selection and use
  • NIST Special Publication 800-53
  • OWASP ASVS: Web Application Security Verification Standard
ADVERTISEMENT
Was this article helpful?
YesNo
ShareTweetSendShareScanSend
Previous Post

Internet safety

Next Post

Computer security

Related Posts

Bluehost Affiliate Program Review

List of Best managed DNS providers

1 day ago
Bluehost Affiliate Program Review

What is a DNS management software?

1 day ago
Next Post
Application security

Computer security

Mobile phones in prison

Search NyongesaSande.com


Follow Nyongesa Sande


Follow @nyongesasande

Subscribe to Nyongesa Sande

Editorial policy

Permission to use quotations from any article is granted subject to appropriate credit of the source being given by referencing the direct link of the article on Nyongesa Sande. However, reproducing any content on this site without explicit permission is strictly prohibited.

  Twitter   Instagram     Youtube  Facebook 
Make sure to check out our social media to keep track of the latest content.
Disclaimer: We aim to present the most accurate information possible. Through this website, you might link to other websites which are not under our control. We have no control over the nature, content and availability of those websites. Inclusion of any links does not necessarily imply a recommendation or endorsement of the views expressed within them. All content on this website is copyright to the website’s owner and all rights are reserved. We take no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.
 
ADVERTISEMENT
Facebook Twitter Instagram Pinterest LinkedIn Youtube RSS

Categories

About Us

Nyongesa Sande is a site that brings you a daily dose of well-articulated up to date facts, news, opinions, and important updates from Kenya, Africa, and around the World.

© 2022 Nyongesa Sande - So Much More To Read Now. A Nyosake Investment Inc.

No Result
View All Result
  • News
    • Africa
      • Uganda
      • East African Community
    • African Inventions
    • African History
    • Qatar
    • Quotes
    • Politics
    • Counties
      • Mega Projects in Kenya
    • National
    • Health
    • Family
  • How To
    • Made In Africa
    • Education
    • Facts
    • Science
  • Business
    • Sponsored
    • Manufacturing
    • Real Estate
    • Forex
    • World Billionaires
    • Finance
    • Wealth
    • Bank Swift Codes
    • Affiliate
    • PayPal
    • Cryptocurrency
    • Advertisement
  • Apple
    • iPad
    • Artists
    • iPhone
    • Apple Watch
    • Mac Specs
    • Apple TV
  • Windows
    • Windows 10
    • Surface
    • PC Components
    • Laptops
    • ChromeBooks
  • Tech
    • Tech Terms
    • Phones
    • Phone Rumors
    • Android News
    • Top Deals
    • Gadget Reviews
    • Gift Guides
    • VPN
  • Autos
    • Car Showrooms
    • Electric Vehicle
    • Petrol Stations
    • Car News
    • Latest Cars
    • Auto Sport
    • Car Facts
  • Top 100
    • Business Directory
  • Sports
    • Soccer LiveScores
    • Basketball Scores
    • WRC Safari Rally
  • Entertainment
    • Celebrities
    • Lyrics
    • Theaters
    • Artists
    • Biography
  • HSE
    • Hazards
    • NEBOSH
    • IOSH
    • Construction Safety
    • General Industry
    • Oil & Gas Safety
    • All Safety Courses
  • Forums
    • Ask Anything

© 2022 Nyongesa Sande - So Much More To Read Now. A Nyosake Investment Inc.