<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Injection Flaws- Long Trending Security Risk in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17755#M778</link>
    <description>&lt;P&gt;&amp;gt; iluom (Newcomer II) posted a new topic in Tech Talk on 01-09-2019 06:37 AM in&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; I know&lt;BR /&gt;&amp;gt; that&amp;nbsp;there is no guarantee for 100% security in the world, if someone says it's&lt;BR /&gt;&amp;gt; a myth, however my question is why it's standing at the top of the list? &amp;nbsp; I'm&lt;BR /&gt;&amp;gt; curious to see a best solution and root cause of it.&lt;BR /&gt;&lt;BR /&gt;Unfortunately, the root cause is stupidity (on the part of developers), and, equally unfortunately, there is no solution to stupidity.&amp;nbsp; Constant vigilance is the price of having all kinds of creative people building interesting (and all-too-often-useless) stuff without having to go through formal processes of education and certification.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Jan 2019 19:12:14 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2019-01-09T19:12:14Z</dc:date>
    <item>
      <title>Injection Flaws- Long Trending Security Risk</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17740#M773</link>
      <description>&lt;P&gt;Good day All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Injection flaws are trending in OWASP top 10 security risks for the last 15 years. It's No.1 risk.&lt;/P&gt;&lt;P&gt;Interestingly moving from&amp;nbsp; A6 to A2 to A1 (Please see the pic)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are many sophisticated injection vulnerability scanning tools, code analysis tools , pen test tools available, there is a lot of awareness about this risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Injection flaws are easy to discover when examining code, but frequently hard to discover via testing. Scanners and fuzzers can help attackers find injection flaws&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;despite of it... it's raising... can't we defend against it to bring it down&amp;nbsp;99% ?&amp;nbsp; I know that&amp;nbsp;there is no guarantee for 100% security in the world, if someone says it's a myth, however my question is why it's standing at the top of the list?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm curious to see a best solution and root cause of it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OWASP10.jpg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/2883iA7906ECD58335BCF/image-size/large?v=v2&amp;amp;px=999" role="button" title="OWASP10.jpg" alt="OWASP10.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 11:37:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17740#M773</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-01-09T11:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Injection Flaws- Long Trending Security Risk</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17751#M776</link>
      <description>&lt;P&gt;Great questions.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm going to limit my response to SQL injection vulnerabilities.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No matter how often I urge people to avoid dynamic SQL, they continue to use it.&amp;nbsp; &amp;nbsp;Obviously, dynamic SQL can be made safe through through data escaping and other related hygiene.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been working with SQL since the very earliest days of DB2, and back then we&amp;nbsp;were forced to deploy&amp;nbsp; parameterized procs&amp;nbsp;that were written by our DBA team because DB2 was so inefficient back then.&amp;nbsp; &amp;nbsp; Ironically, that may still be the best approach - not for performance, but to help safeguard against SQL injection attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Generally speaking, I don't think we pay enough attention to demonstrating what the bad guys can do with injection attacks.&amp;nbsp; &amp;nbsp;We can use the famous Hack Me Bank....&amp;nbsp; &amp;nbsp;But I've found big improvement when developers actually see what an injection attack can do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously, building dynamic and static scanning into the SDLC so that developers can test their own work products while they're in the development phase is quite effective.&amp;nbsp; &amp;nbsp; &amp;nbsp;And at first, it's probably going to be necessary to ensure such scanning is taking place.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course, a comprehensive pen testing program is also required, but it really shines when the other steps are taken earlier in the SDLC.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 18:41:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17751#M776</guid>
      <dc:creator>DHerrmann</dc:creator>
      <dc:date>2019-01-09T18:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Injection Flaws- Long Trending Security Risk</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17755#M778</link>
      <description>&lt;P&gt;&amp;gt; iluom (Newcomer II) posted a new topic in Tech Talk on 01-09-2019 06:37 AM in&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; I know&lt;BR /&gt;&amp;gt; that&amp;nbsp;there is no guarantee for 100% security in the world, if someone says it's&lt;BR /&gt;&amp;gt; a myth, however my question is why it's standing at the top of the list? &amp;nbsp; I'm&lt;BR /&gt;&amp;gt; curious to see a best solution and root cause of it.&lt;BR /&gt;&lt;BR /&gt;Unfortunately, the root cause is stupidity (on the part of developers), and, equally unfortunately, there is no solution to stupidity.&amp;nbsp; Constant vigilance is the price of having all kinds of creative people building interesting (and all-too-often-useless) stuff without having to go through formal processes of education and certification.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 19:12:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17755#M778</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-01-09T19:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: Injection Flaws- Long Trending Security Risk</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17772#M779</link>
      <description>&lt;P&gt;SQL Injection Illustration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SQLInjection.jpg" style="width: 602px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/2884i31F60B42FAA97FB5/image-size/large?v=v2&amp;amp;px=999" role="button" title="SQLInjection.jpg" alt="SQLInjection.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Image Courtesy : xkcd.com&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 05:20:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Injection-Flaws-Long-Trending-Security-Risk/m-p/17772#M779</guid>
      <dc:creator>iluom</dc:creator>
      <dc:date>2019-01-10T05:20:59Z</dc:date>
    </item>
  </channel>
</rss>

