Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities

Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities

NDC Conferences via YouTube Direct link

Katy Anton

2 of 30

2 of 30

Katy Anton

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Katy Anton
  3. 3 Common Weakness Enumeration
  4. 4 CWEs in Injection Category
  5. 5 Decompose the Injection
  6. 6 Extract Security Controls
  7. 7 Security Controls: Security Logging
  8. 8 The 6 Best Types of Detection Points
  9. 9 Examples of Intrusion Detection Points
  10. 10 Secure Data Handling: Basic Workflow
  11. 11 Data at Rest: Design Vulnerability example
  12. 12 Tool for Publicly Disclosed Machine Keys
  13. 13 Encryption: Security Controls
  14. 14 Data in Transit: Security Controls
  15. 15 State of Software Security
  16. 16 Root Cause
  17. 17 What is Attack Surface?
  18. 18 Fundamental Security Principle
  19. 19 Components Examples
  20. 20 Implement Logging Library
  21. 21 Simple Wrapper
  22. 22 Implement a Payment Gateway
  23. 23 Adapter Design Pattern
  24. 24 Implement a Single Sign-On
  25. 25 Facade Design Pattern
  26. 26 Secure Software Starts from Design!
  27. 27 Rick Rescorla
  28. 28 Security Controls In Development Cycle
  29. 29 Final Takeaways
  30. 30 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.