<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Addressing security issues in Exam Preparation</title>
    <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41207#M3366</link>
    <description>&lt;P&gt;Answer C infers doing more than just looking at securing a legacy web application. A security assessment would entail looking at the entire security landscape, quite the increase in scope if done correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Answer D would be a targeted control for a legacy web application, more comparable to a scalpel than the blunt force of a full security assessment. You should do a security assessment at least once a year or when you have a major change in your business or workflow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- b/eads&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2020 22:16:53 GMT</pubDate>
    <dc:creator>Beads</dc:creator>
    <dc:date>2020-12-02T22:16:53Z</dc:date>
    <item>
      <title>Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41179#M3361</link>
      <description>&lt;P&gt;Dear Team&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="card-text"&gt;What is the BEST approach to addressing security issues in legacy web applications?&lt;/P&gt;&lt;DIV class="question-choices-container"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="multi-choice-letter"&gt;A.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Debug the security issues&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="multi-choice-letter"&gt;B.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Migrate to newer, supported applications where possible&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="multi-choice-letter"&gt;C.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Conduct a security assessment&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="multi-choice-letter"&gt;D.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Protect the legacy application with a web application firewall&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;ADDRESSING&lt;/STRONG&gt; is the key word here which relates to countermeasure or mitigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option A&lt;/STRONG&gt; does not seem to be a fit to address the security issue.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option B&lt;/STRONG&gt; can be a answer but it depends on the cost benefit analysis of the countermeasure.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option C&lt;/STRONG&gt; talks about security assessment &lt;SPAN&gt;which i suppose is important to identify cost benefit analysis of the countermeasure &amp;amp;&amp;nbsp;steps to lower the risk of security issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Option D&lt;/STRONG&gt;&amp;nbsp;can be a answer but it depends on the cost benefit analysis of the countermeasure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I would choose Option C as the best answer as security assessment will let the management know on the cost benefit analysis of the countermeasure &amp;amp;&amp;nbsp;steps to lower the risk of security issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any other thoughts please.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Nitesh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 01 Dec 2020 22:47:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41179#M3361</guid>
      <dc:creator>Nitesh</dc:creator>
      <dc:date>2020-12-01T22:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41181#M3362</link>
      <description>&lt;P&gt;So let me start with "this is a lousy question".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A.&amp;nbsp; Hmm Legacy app and debug - NO&lt;/P&gt;&lt;P&gt;B. Wonderful answer and most likely what you would want to do but it's a legacy app for a reason (it works, there's no money to upgrade/migrate, it cant be migrated, it's a one of a kind.......so many reasons why not)&lt;/P&gt;&lt;P&gt;C. A security assessment is not going to address the issues, it will just re-enforce what the problems are&lt;/P&gt;&lt;P&gt;D. Could be correct but I would need additional information that is not in the question (can the platform support a WAF (performance, etc.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to say I would probably choose D on this one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 08:31:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41181#M3362</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-12-02T08:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41184#M3363</link>
      <description>&lt;P&gt;It's not a good question, but 'legacy' is probably a clue.&amp;nbsp; If an application is legacy it's become very difficult to change and probably had dependencies on a series of out of support technologies and complex dependencies. So I'd suggest D is the best answer.&amp;nbsp; You could get to D and mitigate commodity level layer 7 attacks quickly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 13:56:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41184#M3363</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-12-02T13:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41190#M3364</link>
      <description>&amp;gt; Nitesh (Newcomer II) posted a new topic in Exam Preparation on 12-01-2020 05:47 PM in the (ISC)Â² Community :&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; I would&lt;BR /&gt;&amp;gt; choose Option C as the best answer as security assessment will let the&lt;BR /&gt;&amp;gt; management know on the cost benefit analysis of the countermeasure &amp;amp;Â&amp;nbsp;steps&lt;BR /&gt;&amp;gt; to lower the risk of security issues.&lt;BR /&gt;&lt;BR /&gt;You're learning ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;Dance like nobody's watching. Love like you've never been hurt.&lt;BR /&gt;Develop software like the end user has your home address.&lt;BR /&gt;&lt;A href="http://twitter.com/#!/RobertFischer/status/69117740622950400" target="_blank"&gt;http://twitter.com/#!/RobertFischer/status/69117740622950400&lt;/A&gt;&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Wed, 02 Dec 2020 18:07:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41190#M3364</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-12-02T18:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41206#M3365</link>
      <description>&lt;P&gt;Welcome back Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I still think C is not correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is the BEST approach to addressing security issues in legacy web applications?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How does C address the security issues other than telling you what you already most likely know?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 22:11:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41206#M3365</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-12-02T22:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41207#M3366</link>
      <description>&lt;P&gt;Answer C infers doing more than just looking at securing a legacy web application. A security assessment would entail looking at the entire security landscape, quite the increase in scope if done correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Answer D would be a targeted control for a legacy web application, more comparable to a scalpel than the blunt force of a full security assessment. You should do a security assessment at least once a year or when you have a major change in your business or workflow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- b/eads&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 22:16:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41207#M3366</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-12-02T22:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41209#M3367</link>
      <description>&lt;P&gt;Thanks, but I am still hung up on the word "addresses"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if C is the right answer I would get this one wrong, but still think it is a bad question and would hope it would not be on an exam.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 22:21:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41209#M3367</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-12-02T22:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41211#M3369</link>
      <description>&lt;P&gt;Like that has ever stopped us before. Whoever wrote the test question needs to go back give the sentence some sort of ownership. One answer being overly broad in my terms the other being enough to scrape by. Otherwise we'd probably agree as to what the best control would be here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- b/eads&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 23:02:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/41211#M3369</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-12-02T23:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/43257#M3486</link>
      <description>&lt;P&gt;I would answer C because as an IT person our first response is to fix it, but a managers response would be to assess the situation and then make a well informed decision.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 01:43:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/43257#M3486</guid>
      <dc:creator>sg2278</dc:creator>
      <dc:date>2021-02-15T01:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing security issues</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/43271#M3490</link>
      <description>&lt;P&gt;Its the scope of the question that limits my interpretation to 'C' not 'D',nothing else. You either fix one specific component or you do a wide survey of all vulnerabilities found and fix them all. The question feel ambiguous as to intent.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 16:23:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Addressing-security-issues/m-p/43271#M3490</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2021-02-15T16:23:31Z</dc:date>
    </item>
  </channel>
</rss>

