Reference Hub1
Taxonomy of Cyber Threats to Application Security and Applicable Defenses

Taxonomy of Cyber Threats to Application Security and Applicable Defenses

Winfred Yaokumah, Ferdinard Katsriku, Jamal-Deen Abdulai, Kwame Okwabi Asante-Offei
ISBN13: 9781799831495|ISBN10: 1799831493|ISBN13 Softcover: 9781799857525|EISBN13: 9781799831501
DOI: 10.4018/978-1-7998-3149-5.ch002
Cite Chapter Cite Chapter

MLA

Yaokumah, Winfred, et al. "Taxonomy of Cyber Threats to Application Security and Applicable Defenses." Modern Theories and Practices for Cyber Ethics and Security Compliance, edited by Winfred Yaokumah, et al., IGI Global, 2020, pp. 18-43. https://doi.org/10.4018/978-1-7998-3149-5.ch002

APA

Yaokumah, W., Katsriku, F., Abdulai, J., & Asante-Offei, K. O. (2020). Taxonomy of Cyber Threats to Application Security and Applicable Defenses. In W. Yaokumah, M. Rajarajan, J. Abdulai, I. Wiafe, & F. Katsriku (Eds.), Modern Theories and Practices for Cyber Ethics and Security Compliance (pp. 18-43). IGI Global. https://doi.org/10.4018/978-1-7998-3149-5.ch002

Chicago

Yaokumah, Winfred, et al. "Taxonomy of Cyber Threats to Application Security and Applicable Defenses." In Modern Theories and Practices for Cyber Ethics and Security Compliance, edited by Winfred Yaokumah, et al., 18-43. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-3149-5.ch002

Export Reference

Mendeley
Favorite

Abstract

Application security measures are the controls within software systems that protect information assets from security attacks. Cyber attacks are largely carried out through software systems running on computing systems in cyberspace. To mitigate the risks of cyber attacks on software systems, identification of entities operating within cyberspace, threats to application security and vulnerabilities, and defense mechanisms are crucial. This chapter offers a taxonomy that identifies assets in cyberspace, classifies cyber threats into eight categories (buffer overflow, malicious software, input attacks, object reuse, mobile code, social engineering, back door, and logic bomb), provides security defenses, and maps security measures to control types and functionalities. Understanding application security threats and defenses will help IT security professionals in the choice of appropriate security countermeasures for setting up strong defense-in-depth mechanisms. Individuals can also apply these safeguards to protect themselves from cyber-attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.