Book description
The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- About the Author
- Contributors
- Introduction
-
Domain 1 - Secure Software Concepts
- Holistic Security
- Core Security Concepts
- Design Security Concepts
- Risk Management
- Security Policies: The ‘What’ and ‘Why’ for Security
- Software Development Methodologies
- Regulations, Privacy and Compliance
- Domain 2 - Secure Software Requirements
- Domain 3 - Secure Software Design
-
Domain 4 - Secure Software Implementation/Coding
- Who is to be Blamed for Insecure Software?
-
Common Software Vulnerabilities and Controls
- Buffer Overflow
- Stack Overflow
- Heap Overflow
- Injection Flaws
- Broken Authentication and Session Management
- Cross-Site Scripting (XSS)
- Non-persistent or Reflected XSS
- Persistent or Stored XSS
- DOM based XSS
- Insecure Direct Object References
- Security Misconfiguration
- Sensitive Data Exposure
- Missing Function Level Checks
- Cross-Site Request Forgery (CSRF)
- Using Known Vulnerable Components
- Unvalidated Redirects and Forwards
- File Attacks
- Race Condition
- Side Channel Attacks
- Defensive Coding Practices – Concepts and Techniques
- Secure Software Processes
-
Domain 5 - Secure Software Testing
- Quality Assurance
-
Attack Surface Validation (Security Testing)
- Motives, Opportunities and Means
- Testing of Security Functionality versus Security Testing
- The Need for Security Testing
- Security Testing Methods
- Types of Security Testing
-
Software Security Testing
- Testing for Input Validation
- Testing for Injection Flaws Controls
- Testing for Scripting Attacks Controls
- Testing for Non-repudiation Controls
- Testing for Spoofing Controls
- Testing for Error and Exception Handling Controls (Failure Testing)
- Testing for Privileges Escalations Controls
- Anti-Reversing Protection Testing
- Tools for Security Testing
- Test Data Management
- Domain 6 - Software Acceptance
- Domain 7 - Software Deployment, Operations, Maintenance, and Disposal
-
Domain 8 - Supply Chain and Software Acquisition
-
Software Acquisition and the Supply Chain
- Acquisition Lifecycle
- Software Acquisition Models and Benefits
- Supply Chain Software Goals
- Threats to Supply Chain Software
- Software Supply Chain Risk Management (SCRM)
- Supplier Risk Assessment and Management
- Supplier Sourcing
- Contractual Controls
- Intellectual Property (IP) Ownership and Responsibilities
- Software Development and Testing
- Software SCRM during Delivery (Handover)
- Software SCRM during Retirement
-
Software Acquisition and the Supply Chain
- Appendix A - Answers to Review Questions
- Appendix B - Security Models
- Appendix C - Threat Modeling
- Appendix D - Commonly Used Opcodes in Assembly
- Appendix E - HTTP/1.1 Status Codes and Reason Phrases (IETF RFC 2616)
- Appendix F - Security Testing Tools
- Index
Product information
- Title: Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition
- Author(s):
- Release date: August 2013
- Publisher(s): Auerbach Publications
- ISBN: 9781000758115
You might also like
book
Official (ISC)2 Guide to the CSSLP
The Official (ISC)2 Guide to the CSSLP is the first comprehensive guide to the Certified Secure …
book
The Official (ISC)2 CCSP CBK Reference, 3rd Edition
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. …
book
CSSLP Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …
book
CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition, 2nd Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …