Secure by Design 403 –Secure Design.pptx

KalenjinGamer 20 views 14 slides Jun 28, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

presentation


Slide Content

SBD 403 –Secure by Design Marvin Korir August 26, 2023

Security Considerations for Request 01 Field Sizing and Evaluation 02 Data Transport Security 03 User Authentication 04 Password Storage and Handling 05 Handling Incorrect Login Attempts 8/27/2023 2

Security Considerations for Retrieval 01 Field Length and Data Types 02 Database Security Issues 8/27/2023 3

Security Specification for Review User Identification and Access Rights Model 8/27/2023 4

Field Sizing and Evaluation Using OWASP Input Validation cheat sheet for secure design. Guidelines for Name, Address, and Phone Number fields. Preventing buffer overflows, XSS attacks, and injection attempts. 8/27/2023 5

Data Transport Security Importance of secure data transmission according to OWASP. Usage of HTTPS (TLS) for encrypted data transport. Prevention of eavesdropping and man-in-the-middle attacks. 8/27/2023 6

User Authentication Secure user authentication for a more robust system. Implementation of strong authentication mechanisms. Benefits of multi-factor authentication (MFA). 8/27/2023 7

Password Storage and Handling Secure password storage using strong techniques. Hashing passwords with salts for increased security. OWASP Password Storage Cheat Sheet reference. 8/27/2023 8

Handling Incorrect Login Attempts Preventing unauthorized access and brute force attacks. Implementing account lockout mechanisms. Usage of CAPTCHA challenges to thwart automated attacks. 8/27/2023 9

Field Length and Data Types Guidelines for Name, Address, Phone Number, and other fields. Preventing buffer overflow and performance issues. Ensuring consistent storage space and data integrity. 8/27/2023 10

Database Security Issues Protection against SQL injection vulnerabilities. Data encryption at rest for sensitive information. Role-Based Access Control (RBAC) for access restriction. 8/27/2023 11

User Identification and Access Rights Identification methods: username-password or MFA. Definition of user roles and access rights. Applying the principle of least privilege for security. 8/27/2023 12

Conclusion 8/27/2023 13

05 Closing Thanks to your commitment and strong work ethic, we know next year will be even better than the last. We look forward to working together. Ana [email protected] 8/27/2023 14
Tags