A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://pojntfx.github.io/uni-appsecurity-notes/main.html below:

Uni App Security Notes

Introduction

Please check out Jakob’s notes for more detailed study materials!

Contributing

These study materials are heavily based on professor Heuzeroth’s “Anwendungssicherheit” lecture at HdM Stuttgart.

Found an error or have a suggestion? Please open an issue on GitHub (github.com/pojntfx/uni-appsecurity-notes):

QR code to source repository

If you like the study materials, a GitHub star is always appreciated :)

License AGPL-3.0 license badge

Uni App Security Notes (c) 2022 Felicitas Pojtinger and contributors

SPDX-License-Identifier: AGPL-3.0

Organization Overview Elements of a Secure Development Process

Primary purpose: Analysis of the data flow; data is both protected by the GDPR and represents value of the corportation

Support Hierarchy Basics What is Secure Software? What is Security? CISSP Domains/Certificates Why Security? Common Terms
  1. Threat agent gives rise to threat
  2. Threat exploits vulnerability
  3. Vulnerability leads to risk
  4. Risk can damage asset and causes exposure
  5. Exposure can be countermeasured by a safeguard
  6. Safeguard directly affects threat agent
Threat Agents Researching Vulnerabilities CVSS Metrics

Results in a number which can be used to classify the vulnerability.

Balancing Security Writing Secure Software Finishing Thoughts Web Application Security Legal notes Components of Web Environments Targets Risks in the Layered Architecture Methods to find Vulnerabilities Pentesting Process
  1. Pre-Attack Phase
    1. Rules of engagement must be noted in a contract
    2. Customer’s requirements need to be queried
    3. Enumeration
      1. Passive: Enumerating without having access to client’s network
      2. Active: Scanning
  2. Attack Phase:
    1. Perimeter breach
    2. Access
    3. Exploit/privilege escalation
    4. Keeping access
    5. Removing all traces
  3. Post-Attack Phase:
    1. Restoring the pre-attack state
    2. Writing the report
    3. Posting recommendations on how to continue (i.e. fixing the vulnerabilities)

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4