Charles Weir's Security presentation for Code Cumbria, January 2014
13
Security in Software Presentation for Code Cumbria
-
Upload
charles-weir -
Category
Technology
-
view
95 -
download
1
description
Pictures illustrating a short talk on what are software security threats, and how a secure development process can help deal with them.
Transcript of Charles Weir's Security presentation for Code Cumbria, January 2014
![Page 1: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/1.jpg)
Security in Software
Presentation for Code Cumbria
![Page 2: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/2.jpg)
• What’s a Secure Project?• What are threats?• 5 different types of security• Help: OWASP, PCI …• A security process
![Page 3: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/3.jpg)
Baddy
![Page 4: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/4.jpg)
Attackers
UsersBank
App
How?
![Page 5: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/5.jpg)
Confidentiality:
![Page 6: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/6.jpg)
Integrity:
£ 1000 0
John Jones
21 April 2013
X
![Page 7: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/7.jpg)
Availability:
X
![Page 8: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/8.jpg)
Authenticity:
X
![Page 9: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/9.jpg)
Non-repudiation:
X
![Page 10: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/10.jpg)
Support:
![Page 11: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/11.jpg)
Penrillian Secure development process
![Page 12: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/12.jpg)
Thank you.
![Page 13: Charles Weir's Security presentation for Code Cumbria, January 2014](https://reader037.fdocuments.net/reader037/viewer/2022110303/54b74b144a79596e388b4615/html5/thumbnails/13.jpg)
Questions?