From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
The goals of application security
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
The goals of application security
- [Instructor] I have pretty strong opinions on the importance of the concepts laid out in the CSSLP body of knowledge above and beyond the value that the cert can provide for your career. Application security is one of my favorite areas within cybersecurity. I've been a practitioner for years, and I'm yet to get bored, far from it. Technology continues to change at a breakneck pace, and so do the apps that enable us to interact with that tech. Take the video game industry, for example. Over just a few decades, video games evolved from Pong, a simple paddle and ball game that you played on a single computer to a multi-billion dollar industry with competitive multiplayer games that rely on internet connected applications to work. With all that money on the line, attackers know that finding and exploiting an application security weakness could lead them to a quick payday. If a criminal exploits an AppSec weakness in a video game, they might be able to cheat or get virtual loot they didn't pay for. But what happens when that same criminal turns their attention to critical national infrastructure? The industrial control systems that control power, water, and public communication have become more and more reliant on applications. While consumer facing apps have been modernized to keep pace with consumer expectations, the same can't be said about the apps controlling our infrastructure. If an attacker were to find and exploit a weakness in one of these systems, the end result could be a loss of life on a massive scale. And have you thought about how much software is running in modern automobiles? Two security researchers, Charlie Miller and Chris Valasek were featured in a 2015 WIRED article where they demonstrated how they were able to remotely hack into a vehicle and take control. As more and more self-driving vehicles find their way onto public roads, folks like you and me are really, really hoping that the people creating the software in those vehicles are doing their best to secure those apps. Physical safety concerns aside, I also believe that we have an expectation of a right to digital privacy. That said, how do you think organizations manage our healthcare data, our financial data, or personally identifiable information? Exactly, applications. Hundreds of millions of records have been compromised since we started tracking those numbers in publicly disclosed data breaches. How many of those breaches could have been mitigated with stronger application security controls? Application security is just one of multiple domains necessary for protecting the systems and data that process and store all this information. But make no mistake, it's a really, really important one. At the end of the day, protecting apps isn't just about the technical ones and zeros. It's about protecting the people who might be impacted by a criminal who is able to exploit an application security weakness, and do harm. By improving your application security knowledge, you'll be able to tip those scales in favor of the good guys.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Secure architecture and design patterns3m 43s
-
(Locked)
Identifying and prioritizing controls6m 15s
-
(Locked)
Traditional application architectures7m 23s
-
(Locked)
Pervasive and ubiquitous computing6m 43s
-
(Locked)
Rich internet and mobile applications7m 9s
-
(Locked)
Cloud architectures7m 8s
-
(Locked)
Embedded system considerations8m 45s
-
(Locked)
Architectural risk assessments6m 59s
-
(Locked)
Component-based systems5m 2s
-
(Locked)
Security enhancing tools4m 8s
-
(Locked)
Cognitive computing4m 37s
-
(Locked)
Control systems8m 34s
-
(Locked)
-
-
(Locked)
Components of a secure environment8m 25s
-
(Locked)
Designing network and server controls4m 22s
-
(Locked)
Designing data controls6m 25s
-
(Locked)
Secure design principles and patterns5m 6s
-
(Locked)
Secure interface design6m 49s
-
(Locked)
Security architecture and design review3m 6s
-
(Locked)
Secure operational architecture3m 37s
-
(Locked)