Software Security

Card Puncher Data Processing

About

Security regroups many subject area.

The most known are:

Provide mechanism rather than policy. In particular, place user interface policy in the clients hands

Illustrations

The most effective picture to explain software security.

Software Security

Everything I try to teach my freshman about security, in one photo:

Security In One Photo

Data Lost

Data Lost or downtime. http://www.emc.com/microsites/emc-global-data-protection-index/index.htm

Data Lost

First Rule

Don't hire assholes

Donthireassholes

Security / Privacy

Security Privacy Bennett

En Twitter

Security and bug

The security industry is largely obsessed by finding (and selling / using / patching / reporting / showcasing / stockpiling / detecting / stealing) these “dangerous/useful” variety of bugs. And this obsession is continually fulfilled because bugs keep happening – which is just the nature of software development

…………

Documentation / Reference





Discover More
Card Puncher Data Processing
Application - Prevention

Prevention is better than cure. Mikko Hypponen Within security matter, no cure exist. If an attacker has compromised a system and gained...
Thomas Bayes
Data Mining - Intrusion detection systems (IDS) / Intrusion Prevention / Misuse

Classical security mechanisms, i.e. authentication and encryption, and infrastructure components like firewalls cannot provide perfect security. Therefore, intrusion detection systems (IDS) have been...
Data System Architecture
Data Warehousing - 34 Kimball Subsytems

This page takes back the Kimball Datawarehouse 34 Subsystem as a table of content and links them to a page on this website....
J2ee Server
Java - Container

A container is a logical part of a J2EE Server which contains java components Before any component can be executed, it must be assembled. The assembly process involves per logical container: the...
Security Testing Software

In order to assess the security of an application, security testing software are used and may acts as: workload generator forward proxy vulnerability...
Browser
Web - Browser

A browser is a user agent. The figure shows some of the components you will find in a browser. To the left, there is the user interface. The browser needs a rendering engine to display pages, and...
Web - Security

in a Web app Email Dmarc Cross-site Scripting ... s-rah/onionscanonionscan Burp Suite (Java based) Burp Suite Community Documentation...
Card Puncher Data Processing
What are Identity and Access Management Services (IAM)? ie Authentication and Authorization

Identity and Access Management is a component of software security that manages the following functionalities: Identification: Who are you? authentication: Prove it. authorization: Here is what...



Share this page:
Follow us:
Task Runner