1
Gain free access to otherwise paid-for content Access sensitive or restricted information Spy on a user’s web browsing habits Steal a user’s identity Defame corporations Damage Web applications Launch Denial of Service attacks APPLICATION SECURITY Web-based software components provide a new attack vector that can be used to exploit weaknesses in software quality and business logic in order to: What is an App? Applications are special software programs accessed and used via the Internet – from desktops and servers to mobile devices. For consumers, applications are an easy and efficient way to connect to favorite websites and productivity tools, but businesses and organizations also use applications to support mission-critical functions. Businesses, organizations, and consumers are increasingly reliant on applications for a variety of different purposes. This increases the potential for hackers to compromise corporate data, user privacy, and perform malicious activity. Applications need to be secure It’s not a question of “if” but “when” attacks will occur Productivity Reputation Revenue Expenses Working with law enforcement, recovering systems, and investigating depth of a compromise requires time and resources Security incidents undermine consumer confidence and impact purchasing decisions Customers can’t conduct transactions on unavailable websites or applications. Recovery costs represent additional, unplanned expenses Identify and prioritize critical applications, test for security, and retest when applications change to protect critical assets. Incorporate security into your development lifecycle Apps are used on desktops, servers, laptops, mobile devices, and in the cloud. *Source: “State of Web Application Security,” Ponemon Institute, 2011 CONSUMER CORPORATION Types of Applications 85% of U.S. companies have experienced one or more data breaches* 85% of organizations test fewer than 25% of applications for vulnerabilities* 66% Applications are the front door to critical data Social networking Webmail Internet Browser RSS Readers Cloud Applications HR/Payroll Inventory Management www.att.com/consulting/security

AT&T Security & Applications-4-23 › ... › pdf › application_security.pdf · Spy on a user’s web browsing habits Steal a user’s identity Defame corporations ... Revenue Expenses

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: AT&T Security & Applications-4-23 › ... › pdf › application_security.pdf · Spy on a user’s web browsing habits Steal a user’s identity Defame corporations ... Revenue Expenses

Gain free access to otherwise paid-for content

Access sensitive or restricted information

Spy on a user’s web browsing habits

Steal a user’s identity

Defame corporations

Damage Web applications

Launch Denial of Service attacks

APPLICATIONSECURITY

Web-based software components provide a new attack vector that can be used to exploit weaknesses in software quality and business logic in order to:

What is an App?Applications are special software programs accessed and used via the

Internet – from desktops and servers to mobile devices. For consumers,

applications are an easy and efficient way to connect to favorite

websites and productivity tools, but businesses and organizations also

use applications to support mission-critical functions.

Businesses, organizations, and consumers are increasingly

reliant on applications for a variety of different purposes.  This

increases the potential for hackers to compromise corporate

data, user privacy, and perform malicious activity.

Applications need to be secureIt’s not a question of “if” but “when” attacks will occur

ProductivityReputationRevenue Expenses Working with law enforcement, recovering systems, and investigating depth of a compromise requires time and resources

Security incidents undermine consumer confidence and impact purchasing decisions

Customers can’t conduct transactions on unavailable websites or applications.

Recovery costs represent additional, unplanned expenses

Identify and prioritize critical applications, test for security, and retest when applications change to protect critical assets.

Incorporate security into your development lifecycle

Apps are used on desktops, servers, laptops, mobile devices, and in the cloud.

*Source: “State of Web Application Security,” Ponemon Institute, 2011

CONSUMERCORPORATION

Types of Applications

85% of U.S. companies have experienced one

or more data breaches*

85%of organizations test

fewer than 25% of applications for vulnerabilities*

66%

Applications are the front door to critical data

Social networking

Webmail

Internet Browser

RSS Readers

Cloud Applications

HR/Payroll

Inventory Management

www.att.com/consulting/security