Skip to Content
Application Security Program Handbook
book

Application Security Program Handbook

by Derek Fisher
January 2023
Intermediate to advanced content levelIntermediate to advanced
296 pages
10h 8m
English
Manning Publications
Content preview from Application Security Program Handbook

2 Defining the problem

This chapter covers

  • Defining the security tenants that software must adhere to
  • Identifying and understanding risk that impacts software
  • Exploring security in the software development life cycle

In the previous chapter, I used the example of building a house without the locks on the doors and windows. A house is a great example, as it allows you to think about the controls you use to limit your risk of the house being compromised due to break-in, fire, flooding, and so forth. We spend most of our time in security attempting to limit risk and counter threats, not eliminate them. A risk is the potential for loss of an asset or damage to an asset, whereas a threat is the activity that takes advantage of a weakness in an asset. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Application Security - A complete guide

Application Security - A complete guide

Derek Fisher
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9781633439818Publisher SupportOtherPublisher WebsitePurchase Link