DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
bin/cvename.cgi?name=CVE-2007-6750
|_ http://ha.ckers.org/slowloris/
50000/tcp open ibm-db2
|_clamav-exec: ERROR: Script execution failed
(use -d to debug)
Nmap done: 1 IP address (1 host up) scanned in
130.29 seconds

PROTECTING APPLICATIONS


An important step in protecting applications is to
recognize the risks. Before we talk about the potential
risks, it is essential to understand some key terms and
their relationships:


Hacker or attacker: These terms are applied to the people who seek
to exploit weaknesses in software and computer systems for gain. The
majority of the time, hackers have benign intentions and are simply
motivated by curiosity; however, their actions may violate the intended
use of the systems they are exploiting. The results can range from mere
mischief (such as creating a virus with no intentionally negative impact)
to malicious activity (such as stealing or altering information).
Malicious code: Malicious code is unwanted files or programs that
can cause harm to a computer or compromise data stored on a
computer. Malicious code includes viruses, worms, and Trojan horses.

Tiers of Securing and Protecting


Enterprises depend on applications to run their
businesses. Apps not only help customers and partners
connect with the enterprise, but a lot of times they enable
employees to get their jobs done as well. Unfortunately,
applications remain one of the most commonly exploited
threat vectors. An enterprise needs to secure and protect
web, mobile, and API applications from being
compromised and preventing data breaches. As
mentioned earlier, application security is a framework
that involves making applications more secure and,
therefore, an end-to-end approach is needed.


The multilayered software architecture is one of the most
famous architectural patterns. Figure 14-2 shows a

Free download pdf