From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Component-based systems
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Component-based systems
- [Instructor] Most application architectures rely on multiple, interconnected components that fit together like puzzle pieces, and if those puzzle pieces don't fit together securely, apps built on those architectures could be exposed to compromise. Those components might include pieces of software, web services, web resources, and even interchangeable software modules. An example of a component-based system would be a web application that includes APIs that are accessible to end users. It might also import other data feeds from around the web to provide more context around the data it processes and stores. More often than not, attackers are less interested in your application than they are in the data processed and stored by your apps. That's why one of the most prominent security concerns with component-based systems is where and how you store that data. If your application permits client-side storage or network-attached storage, then you'll want to be a little more diligent…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Secure architecture and design patterns3m 43s
-
(Locked)
Identifying and prioritizing controls6m 15s
-
(Locked)
Traditional application architectures7m 23s
-
(Locked)
Pervasive and ubiquitous computing6m 43s
-
(Locked)
Rich internet and mobile applications7m 9s
-
(Locked)
Cloud architectures7m 8s
-
(Locked)
Embedded system considerations8m 45s
-
(Locked)
Architectural risk assessments6m 59s
-
(Locked)
Component-based systems5m 2s
-
(Locked)
Security enhancing tools4m 8s
-
(Locked)
Cognitive computing4m 37s
-
(Locked)
Control systems8m 34s
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-