APPLICATION SECURITY Fundamentals
Key concepts for Cybersecurity top threats with hacking scenarios
Advanced App Engineering Associate Manager at Accenture. 15+ years developing, designing, and architecting enterprise solutions in different languages (mainly in Java). DevOps practitioner, Cloud solutions lover and Application Security applied to SDLC (Software Delivery Lifecycle) evangelist.
No video of the event yet, sorry!
Join us in a tour of various scenarios identifying the basic concepts about Application Security, learning about some of the most recent vulnerabilities and data breaches, as well as examples of how easy it can be to hack you.
Application Security not only consists in the use of software, hardware, and procedural methods to protect applications from external threats, it is more than technology, is a path not a destination, it is about risk management and implementing effective countermeasures to identify potential threats and understand that each threat presents a degree of risk.
Once an afterthought in software design, security is becoming an increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Security measures built into applications and a sound application security routine minimize the likelihood that unauthorized code will be able to manipulate applications to access, steal, modify, or delete sensitive data.
APP SECURITY FOUNDATIONS
• Are we secure, or not? This is a common misconception and it depends on the threat
• Brief history of App Security. Some of the highlights and reactions dating back to the late ‘80s; how attackers have evolved from individuals to organized groups of cyber criminals; attackers improve their tactics and new vulnerability disclosures continue to trend upward; mobile applications vulnerabilities or automotive Cyber threats are exploited nowadays
• The life of a Cyberthreat. Ever wonder how cyberattacks and malware are created, and how they get into your system to steal your data?
• Cybersec awareness: Malware. What is the difference between virus, worm, trojan horse, ... malware programs?
• Hacker and Cracker differences. Why do those dedicated bother them so much when the terms are confused?
• How it works: Cybersecurity, Cloud and Mobile Security. Having the proper response plan in place in case of a security breach can stop it from becoming a major disaster; Data is shifting rapidly to the cloud and hackers are constantly looking to breach these valuable data sources; as mobile technology becomes more advanced, so do the security attacks of those who want to exploit mobile technology, creating a multitude of troubling scenarios
• Build a Secure application. Identify layers in which to apply security to design and build secure applications
• Security main elements. Security relies on Authentication, Authorization, Auditing elements; Security also relies on the Confidentiality, Integrity, Availability elements described below
• Core Security principles. Recommendations applied regardless of implementation technology or app scenario
• How Social Engineering hack you. Simple Social Engineering trick with a phone call and crying baby
• Should we fear hijacking? Hackers remotely (and easily) kill a Jeep on a highway
- 2019 May 25 - 17:30
- 45 min
- Sala 3 - Freeciv
- Opensouthcode 2019
- Spanish; Castilian
- Chatbots, Machine Learning y Microservicios. ALL IN
- Start Time:
- 2019 May 25 17:30
- Sala 1 - Flightgear
- 20.000 registros de viaje submarino
- Start Time:
- 2019 May 25 17:30
- Sala 2 - 0 A.D.