Please enable JavaScript.
Coggle requires JavaScript to display documents.
System and Network Defense, Application Security, Network Hardening,…
-
Application Security
Integrity Checks
An integrity check can measure the consistency of data in a file, picture or record to ensure that it has not been corrupted. The integrity check performs a hash function to take a snapshot of data and then uses this snapshot to ensure data has remained unchanged. A checksum is an example of a hash function.
-
Application Development
To maintain security at all stages of application development, a robust process needs to be followed
-
Avatar
Cybercriminals often target sensitive information stored in databases. Implementing application security practices helps to protect databases against attack. Let’s take a closer look.
Input Validation
Controlling the data input process is key to maintaining database integrity. Many attacks run against a database and insert malformed data. Such attacks can confuse, crash or make the application divulge too much information to the attacker.
-
Network Hardening
-
Telnet, SSH and SCP
Secure Shell (SSH) is a protocol that provides a secure (encrypted) remote connection to a device. Telnet is an older protocol that uses unsecure plaintext when authenticating a device (user name and password) and transmitting data. SSH should be used rather than Telnet to manage connections, as it provides strong encryption. SSH uses TCP port 22. Telnet uses TCP port 23.
Secure copy (SCP) securely transfers files between two remote systems. SCP uses SSH for data transfer and authentication, ensuring the authenticity and confidentiality of the data in transit.
Secure Protocols
Attackers can penetrate a network’s infrastructure through services, protocols and open ports. Older protocols leave a network in a vulnerable position, so cybersecurity professionals need to make sure current protocols are being used.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-