Many security issues occur when software acts in an unexpected manner in response to invalid user input or another error situation. For this reason, appropriately handling errors is a critical component of software security. In this video, learn about secure coding practices, including proper error and exception handling techniques for software.
- [Announcer] Many security issues occur when software…acts in an unexpected manner in response to invalid user…input or another error situation.…For this reason, appropriately handling errors…is a critical component of software security.…Software is designed to perform orderly transitions…between different states.…For example, let's consider a very simple software program…that is designed to calculate…the sales tax on a retail purchase.…The software might sit at an input screen,…waiting for the user to input the purchase amount.…
Once it receives that input, it calculates…the transaction's tax and then moves into a display mode,…where it displays the tax amount to the user.…The user can then press a new transaction button…to enter another transaction amount.…You might view this as three different states…in the software.…The first one is awaiting input.…Once the user provides the input,…it moves to the calculating tax state,…where the program is actually figuring out the sales tax…amount for that user's inputed transaction value.…
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Comparing viruses, worms, and Trojans
- Backdoors and logic bombs
- Understanding the attacker
- Attack types: from denial of service to brute force attacks
- Preventing insider threats
- Wireless attacks
- Understanding cross-site scripting
- Preventing SQL injection
- Social engineering
- Scanning for vulnerabilities
- Penetration testing
- Assessing the impact of vulnerabilities
Skill Level Beginner
2. Understanding Attackers
3. Understanding Attack Types
4. Wireless Attacks
5. Application Attacks
6. Social Engineering Attacks
7. Vulnerability Scanning and Penetration Testing
8. Impact of Vulnerabilities
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.