Book description
Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- About the Author
- Contributors
- Introduction
-
Domain 1 - Secure Software Concepts
- Holistic Security
- Core Security Concepts
- Design Security Concepts
- Risk Management
- Security Policies: The ‘What’ and ‘Why’ for Security
- Software Development Methodologies
- Regulations, Privacy and Compliance
- Domain 2 - Secure Software Requirements
- Domain 3 - Secure Software Design
-
Domain 4 - Secure Software Implementation/Coding
- Who is to be Blamed for Insecure Software?
-
Common Software Vulnerabilities and Controls
- Buffer Overflow
- Stack Overflow
- Heap Overflow
- Injection Flaws
- Broken Authentication and Session Management
- Cross-Site Scripting (XSS)
- Non-persistent or Reflected XSS
- Persistent or Stored XSS
- DOM based XSS
- Insecure Direct Object References
- Security Misconfiguration
- Sensitive Data Exposure
- Missing Function Level Checks
- Cross-Site Request Forgery (CSRF)
- Using Known Vulnerable Components
- Unvalidated Redirects and Forwards
- File Attacks
- Race Condition
- Side Channel Attacks
- Defensive Coding Practices – Concepts and Techniques
- Secure Software Processes
-
Domain 5 - Secure Software Testing
- Quality Assurance
-
Attack Surface Validation (Security Testing)
- Motives, Opportunities and Means
- Testing of Security Functionality versus Security Testing
- The Need for Security Testing
- Security Testing Methods
- Types of Security Testing
-
Software Security Testing
- Testing for Input Validation
- Testing for Injection Flaws Controls
- Testing for Scripting Attacks Controls
- Testing for Non-repudiation Controls
- Testing for Spoofing Controls
- Testing for Error and Exception Handling Controls (Failure Testing)
- Testing for Privileges Escalations Controls
- Anti-Reversing Protection Testing
- Tools for Security Testing
- Test Data Management
- Domain 6 - Software Acceptance
- Domain 7 - Software Deployment, Operations, Maintenance, and Disposal
-
Domain 8 - Supply Chain and Software Acquisition
-
Software Acquisition and the Supply Chain
- Acquisition Lifecycle
- Software Acquisition Models and Benefits
- Supply Chain Software Goals
- Threats to Supply Chain Software
- Software Supply Chain Risk Management (SCRM)
- Supplier Risk Assessment and Management
- Supplier Sourcing
- Contractual Controls
- Intellectual Property (IP) Ownership and Responsibilities
- Software Development and Testing
- Software SCRM during Delivery (Handover)
- Software SCRM during Retirement
-
Software Acquisition and the Supply Chain
- Appendix A - Answers to Review Questions
- Appendix B - Security Models
- Appendix C - Threat Modeling
- Appendix D - Commonly Used Opcodes in Assembly
- Appendix E - HTTP/1.1 Status Codes and Reason Phrases (IETF RFC 2616)
- Appendix F - Security Testing Tools
- Index
Product information
- Title: Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition
- Author(s):
- Release date: August 2013
- Publisher(s): Auerbach Publications
- ISBN: 9781000758115
You might also like
book
Official (ISC)2 Guide to the CSSLP
As the global leader in information security education and certification, (ISC)2 has a proven track record …
book
The Official (ISC)2 CCSP CBK Reference, 3rd Edition
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. …
book
The Official (ISC)2 CCSP CBK Reference, 4th Edition
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. …
book
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 2nd Edition
The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security Professional …