Threats and Countermeasures

From Guidance Share
Revision as of 23:09, 19 May 2010 by Admin (talk | contribs)
(diff) ←Older revision | Current revision (diff) | Newer revision→ (diff)
Jump to navigationJump to search
CountermeasuresCenter.jpg

This section features software threats, attacks, vulnerabilities and countermeasures.

Threats and Countermeasures

Visual Threats and Countermeasures

Threats – Attacks – Vulnerabilities – Countermeasures

Knowledge Base

  • How Tos
  • Terminology
  • Templates

Application Vulnerability Categories

Input and Data Validation – Authentication – Authorization – Auditing and Logging – Client Side Validation – Communications Security – Configuration Management – Cryptography – Exception Management – Sensitive Data – Session Management

Code Vulnerability Categories

Range – Type – Memory – Cryptography and Secrets – Authentication, Authorization and Trust – Input Validation – Logic Errors – Misuse of Language Features  – Synchronization and Timing

Patterns

Attack Patterns – Vulnerability Patterns – Security Design Patterns – Security Implementation Patterns



Retrieved from "http://guidanceshare.com/index.php?title=Threats_and_Countermeasures&oldid=7263"

Navigation menu

Page actions

  • Article
  • Discussion
  • View source
  • History

Page actions

  • Article
  • Discussion
  • More
  • Toolbox
  • In other languages

Personal tools

  • Log in

Navigation

  • Main Page
  • Community portal
  • Current events
  • Recent changes
  • Random page
  • Help
  • Donations

Toolbox

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information

 
Powered by MediaWiki
  • This page was last edited on 19 May 2010, at 23:09.
  • Privacy policy
  • About Guidance Share
  • Disclaimers