Security vulnerabilites and controls

Controls

Version control

Version control is to be able to

User authentication

User authentication is when a solution confirms that the person is the person that they claim to be through usernames and passwords or biometrics

Encryption

Encryption is to make readable data not readable for the hacker with specific ways to encrypt such as symmetrical encryption and hash encryption

Software updates

To fix any bugs or weaknesses within the application that hackers could take advantage of

Software auditing

To check the softwares code for any possible back doors or malware especially if the code is from the internet

Penertration Testing

To have either a third-party or yourself check for any vulnerablilities within the solution

Vulnerabilities

Data breaches

A data breach is when a companies private data has been taken maliciously by hackers

Man-in-the-middle attacks

A man-in-the-middle attack is an attack that involves a fake wifi network that gives access to the data that goes in and out of the network.

Social Engineering

This is when a malicious actor pretends that they are someone else or a company to gain access or get money from the victims

cross-stire scripting

Cross-site scripting is when a hacker injects code into a space for user-input making the website run it and give access to the hacker to whatever they want

SQL injections

An SQL injection is similar to cross-site scripting but they are using SQL to gain access to information

Third-party software

Software not made by the company that made the operating system

Diminished data integrity

If there is dimished data integrity there means there is a lack of accuracy, authenicity, correctness, reasonableness, relveance and timeliness.