O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 4Host, Application, and Data Security

After completing this chapter, you should be able to do the following:

• List the steps for securing a host computer

• Define application security

• Explain how to secure data

Today’s Attacks and Defenses

Writing computer software code for an application can be a challenging task when trying to ensure that it contains no flaws, errors, or faults—“bugs.” By some estimates, commercial off-the-shelf (COTS) software may contain anywhere from one to five bugs per thousand lines of code.1 Yet even code that is free from operational bugs can have security vulnerabilities, which makes creating secure software even more difficult. Attackers are continually probing to find security weaknesses in software, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required