how secure is secure learning security of software n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
How Secure is Secure? Learning Security of Software PowerPoint Presentation
Download Presentation
How Secure is Secure? Learning Security of Software

Loading in 2 Seconds...

play fullscreen
1 / 18

How Secure is Secure? Learning Security of Software - PowerPoint PPT Presentation


  • 97 Views
  • Uploaded on

How Secure is Secure? Learning Security of Software. Presented by Lee Pepper and Casey Bader. Questions about Security. At some point in the sales process the questions about security arise I’ve led the discussion to this point Integration Data sharing Hosting.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'How Secure is Secure? Learning Security of Software' - ayala


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
how secure is secure learning security of software

How Secure is Secure? Learning Security of Software

Presented by Lee Pepper and Casey Bader

questions about security
Questions about Security
  • At some point in the sales process the questions about security arise
  • I’ve led the discussion to this point
    • Integration
    • Data sharing
    • Hosting
kinds of security concerns
Kinds of Security Concerns
  • Administrative
    • Is a web client secure?
kinds of security concerns1
Kinds of Security Concerns
  • Administrative
    • Is a web client secure?
      • Too technical
    • Is the Internet secure?
    • Can someone hack our system?
    • Can we keep our program-specific data from other departments?
kinds of security concerns2
Kinds of Security Concerns
  • Technical
    • Do you encrypt your data?
    • How do you manage access?
    • Do you have audit logs?
    • What are your backup and restore plans?
general security concerns
General Security Concerns
  • Is a web application secure?
    • Have you ever purchased anything online?
  • Web applications can be secured by using encryption of the communication layer.
  • The use of an SSL key over HTTPS (secure connection)protects your data from being intercepted between your computer and the server.
slide7

General Security Concerns

  • Server Security
    • How do I know my files are secure?
general security concerns1
General Security Concerns
  • Server Security
    • How do I know my files are secure?
      • All data access is logged.
general security concerns2
General Security Concerns
  • Server Security
    • How do I know my files are secure?
      • All data access is logged.
    • Who can access the data?
general security concerns3
General Security Concerns
  • Server Security
    • How do I know my files are secure?
      • All data access is logged.
    • Who can access the data?
      • All data access is controlled at the user level.
        • Per group, user, data logic
        • Data does not leave the server unless user is authenticated and authorized to view the data.
        • Business logic can be applied per field also. (SSN Masking) 123-12-1234 becomes xxx-xx-1234
general security concerns4
General Security Concerns
  • Server Security
    • What if something bad happens?
      • Hosted Data
        • Data can be restored quickly via a backup that is run every 4 hours. (Can be run more often if required)
      • Local Data
        • This is dependent on your IT staff and facility managers
        • We suggest the above to protect your data.
database security
Database Security
  • Hosted Security
    • Who has my data?
      • Green House Data
      • Secure Facility
password security
Password Security
  • What about my password?
    • Passwords are secured by SHA (Secure Hash Algorithm) and this is done using the ASP.NET membership provider; a standard, scalable, user management system.
    • Administrators never have edit access to any passwords.
    • New auto reset path
security groups
Security Groups
  • Can a supervisor have different permissions than a caseworker?
    • Of course. User groups are a simple way to control access to special areas of the system as well as specific actions on objects.
      • Groups can control Add, Edit, Delete
      • They also are a part of business logic security.
        • E.g., if an application is ready for payout you must be a supervisor to update the next status.
slide17

Business Logic Security

  • How does business logic security work?
business logic security
Business Logic Security
  • How does business logic security work?