From the course: Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 24,200 courses taught by industry experts.

Indicators for application attacks

Indicators for application attacks

- [Kelly] Our next section, we're going to examine some potential indications of application-based attacks. And really, you know, when we think about it, the majority of our vulnerabilities are in our applications. If we would spend more time focusing on strengthening our applications using a secure process for software development, verifying security requirements upfront and implementing security throughout all the stages of the SDLC, then obviously our applications would be stronger and we would be less dependent on some of these external security mechanisms. But alas, the world we live in continues the way that it's been for many, many years. We focus on application design, focus on function rather than security. And then security kind of comes up as an afterthought. And you know, we release an application and say, oh, we'll patch it and fix all the security vulnerabilities. And that continues to not work for us. So as application developers, and I know many of you are application…

Contents