Monday, March 10, 2008

Which application security approach really does the trick?

Application security is getting a new pushing as regulations governing the payment-card industry authorization many concerns experience a
software system codification reappraisal or do usage of a Web application firewall starting later this summer.

“Application security is high on everybody’s radar,” states Brad Friedman, Congress of Industrial Organizations at Burlington Coat Factory, which like other
concerns that manage client payment card game is obligated to follow with Payment Card Industry (PCI) . For Friedman, who states his company have already locked down PCs and point-of-sale devices in its 400 stores, the concern
stays for companies how to avoid the sort of credit-card data-breach debacle that had last year.

But the inquiry is: Which of these soon-to-be PCI-required approaches to take? And even if you’re not required to travel with
one of these approaches, makes either of them really make the trick? Code analysis professionals and cons

There’s A broad scope of that aid automate codification analysis for intents of determination security flaws in applications, including those from , , and . And there are application-penetration testing tools such as as the ' software system Core Impact, which utilizes an agent-based approach.

However, many security experts point out that machine-controlled codification analysis have its limits, especially when it refers finding
flaws in the implicit in concern logic of an application.

“Source-code analysis won’t happen all security vulnerabilities,” admits Brian Chess, main man of science at Fortify, which
do tools for static-code analysis and real-time analysis of applications. “It volition happen a batch of exposures that can
be exploited through buffer overflows, cross-site scripting and SQL injection. But source-code analysis can’t state you about
concern logic flaws. It can’t happen designing flaws.”

Others agree.

“Closed beginning or unfastened source, it come ups down to the computer programmer and their psychology,” states Joe Stewart, senior security researcher
at Atlanta-based SecureWorks. “Code review will happen common mistakes, such as as buffer overflows. But determination mistakes in
logic is much harder.” 1 | | | |

Labels: , , , , , ,

0 Comments:

Post a Comment

<< Home