Data breaches, data leaks, web defacements: Why secure coding is important

4Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

On last December 2014, Security brokers (SB)—“Targeted Threats Team”—successfully completed a full analysis, which started back on January 2013, operating over 24 months of deep research and data correlation. Analyzing those main and biggest security incidents and data breaches occurred over the last ten years, starting from the faraway year 2004. The lesson learned was quite impressive and may somehow shake the modus operandi and the mental approach we are used to. This paper aims to recap those key points emerged from that research project, and those new logics we should internally apply within our organizations over the next months and upcoming years. This paper aims to provide, on its first section, the so-called big picture toward those main threats linked with information theft and leaks, and Web defacements, along with those consequent impacts on organizations, through keywords such as Cyber Intelligence, both from open and from closed sources. The second section of the paper provides a general overview of the importance of the so-called secure programming and on those typical mistakes that pop-up when running security testing projects, and advanced penetration testing activities, toward Web applications.

Cite

CITATION STYLE

APA

Chiesa, R., & De Luca Saggese, M. (2016). Data breaches, data leaks, web defacements: Why secure coding is important. In Communications in Computer and Information Science (Vol. 422, pp. 261–271). Springer Verlag. https://doi.org/10.1007/978-3-319-27896-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free