IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Taxonomy of Cyber Threats to Application Security and Applicable Defenses

Taxonomy of Cyber Threats to Application Security and Applicable Defenses
View Sample PDF
Author(s): Winfred Yaokumah (University of Ghana, Ghana), Ferdinard Katsriku (University of Ghana, Ghana), Jamal-Deen Abdulai (University of Ghana, Ghana)and Kwame Okwabi Asante-Offei (Ghana Institute of Management and Public Administration, Ghana)
Copyright: 2020
Pages: 26
Source title: Modern Theories and Practices for Cyber Ethics and Security Compliance
Source Author(s)/Editor(s): Winfred Yaokumah (University of Ghana, Ghana), Muttukrishnan Rajarajan (City University of London, UK), Jamal-Deen Abdulai (University of Ghana, Ghana), Isaac Wiafe (University of Ghana, Ghana)and Ferdinand Apietu Katsriku (University of Ghana, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch002

Purchase

View Taxonomy of Cyber Threats to Application Security and Applicable Defenses on the publisher's website for pricing and purchasing information.

Abstract

Application security measures are the controls within software systems that protect information assets from security attacks. Cyber attacks are largely carried out through software systems running on computing systems in cyberspace. To mitigate the risks of cyber attacks on software systems, identification of entities operating within cyberspace, threats to application security and vulnerabilities, and defense mechanisms are crucial. This chapter offers a taxonomy that identifies assets in cyberspace, classifies cyber threats into eight categories (buffer overflow, malicious software, input attacks, object reuse, mobile code, social engineering, back door, and logic bomb), provides security defenses, and maps security measures to control types and functionalities. Understanding application security threats and defenses will help IT security professionals in the choice of appropriate security countermeasures for setting up strong defense-in-depth mechanisms. Individuals can also apply these safeguards to protect themselves from cyber-attacks.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom