CompTIA CySA+ Study Guide Exam CS0-002 by Mike Chapple & David Seidl

CompTIA CySA+ Study Guide Exam CS0-002 by Mike Chapple & David Seidl

Author:Mike Chapple & David Seidl [Chapple, Mike & Seidl, David]
Language: eng
Format: epub
ISBN: 9781119684114
Publisher: Wiley
Published: 2020-07-28T00:00:00+00:00


Exam Note

The CySA+ exam objectives mention six specific coding best practices: input validation, output encoding, session management, authentication, data protection, and parameterized queries. This is a smaller and less developed list than what OWASP and other organizations maintain, but it is what you can expect to be tested on. Our list includes a broader range of practices to help prepare you for real-world work as well as the exam!

One of the best resources for secure coding practices is the Open Web Application Security Project (OWASP). OWASP is the home of a broad community of developers and security practitioners, and it hosts many community-developed standards, guides, and best practice documents, as well as a multitude of open source tools. OWASP provides a regularly updated list of proactive controls that is useful to review not only as a set of useful best practices, but also as a way to see how web application security threats change from year to year.

Here are OWASP's current top proactive controls (updated in 2018) with brief descriptions:

Define Security Requirements Document what security the software needs and how it should be implemented.

Leverage Security Frameworks and Libraries Use existing security tools to make it easier to develop securely.

Secure Database Access Databases contain most of the important data in modern applications, making database security a key concern.

Encode and Escape Data Ensure that attackers can't embed code or special characters in ways that will be executed or otherwise may cause harm to the application.

Validate All Inputs Treat user input as untrusted and filter appropriately.

Implement Digital Identity Identity is a core security layer, including things like using multifactor authentication, secure password storage and recovery, and session handling.

Enforce Access Controls Require all requests to go through access control checks, deny by default, and apply the principle of least privilege.

Protect Data Everywhere Use encryption in transit and at rest.

Implement Security Logging and Monitoring This helps detect problems and allows investigation after the fact.

Handle All Errors and Exceptions Errors should not provide sensitive data, and applications should be tested to ensure that they handle problems gracefully.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(55926)
What's Done in Darkness by Kayla Perrin(26532)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19015)
The Fifty Shades Trilogy & Grey by E L James(18969)
Shot Through the Heart by Mercy Celeste(18885)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(16993)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(16885)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16810)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16708)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16336)
The Subtle Art of Not Giving a F*ck by Mark Manson(14273)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14075)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13442)
Scorched Earth by Nick Kyme(12718)
Drei Generationen auf dem Jakobsweg by Stein Pia(10926)
Suna by Ziefle Pia(10851)
Scythe by Neal Shusterman(10278)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9483)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9320)
This is Going to Hurt by Adam Kay(9110)