Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Naked Security

Naked Security

DeepSec 2007

Avatar for Mark Curphey

Mark Curphey

March 01, 2007
Tweet

Other Decks in Technology

Transcript

  1. • Topic: Intro • Topic: How Applications Get Built in

    the Real World • Topic: How Geeks Communicate • Topic: Sales and Marketing • Topic: Culture • Topic: Complexity and Context • Topic: Standards, Compliance and Security Councils • Topic: Tools • Topic: Closing True Story
  2. Gentle Life Reminder If you think technology is the solution

    then you don’t understand the problem!
  3. How Geeks Communicate New Topic Communication - Noun a. The

    exchange of thoughts, messages, or information, as by speech, signals, writing, or behavior. b. Interpersonal rapport.
  4. Culture New Topic Noun 1: a particular civilization at a

    particular stage 2: the tastes in art and manners that are favored by a social group 3: all the knowledge and values shared by a society
  5. Most application security people are not software people Most application

    security people have no idea what enterprise software really is or understand the process of how it is created Most application security people think that if they understand HTTP then they understand web application security and can advise people on how to build secure web sites Most application security people can’t write code
  6. NEWS FLASH: The world is not falling down because of

    cross site scripting Security < Performance < Functionality Start caring about the important stuff (before security becomes ignored)
  7. Complexity and Context New Topic Noun 1. complicated nature: the

    condition of being difficult to analyze, understand, or solve 2. condition of having many parts: the condition of being made up of many interrelated parts 3. complicated thing: one of the interrelated problems or difficulties involved in a complicated matter
  8. The 3 Types of “Compliance” 1. Government Regulations 2. Industry

    Standards 3. Marketing FUD Remember: You can‟t spell compliance without „liance’
  9. 6.6 Ensure that all web-facing applications are protected against known

    attacks by applying either of the following methods: • Having all custom application code reviewed for common vulnerabilities by an organization that specializes in application security • Installing an application layer firewall in front of web-facing applications. Note: This method is considered a best practice until June 30, 2008, after which it becomes a requirement. Full document at https://www.pcisecuritystandards.org/tech/download_the_pci_dss.htm
  10. New Topic 1. device for doing work: an object designed

    to do a specific kind of work such as cutting or chopping by directing manually applied force or by means of a motor 2. means to end: something used as a means of achieving something 3. something used for job: something used in the course of somebody's everyday work Tools
  11. A fool with a tool …. is still a fool

    (A tool with a tool …. is definitely a tool)