Skip to main content

Data Breaches, Data Leaks, Web Defacements: Why Secure Coding Is Important

  • Conference paper
  • First Online:
Proceedings of 4th International Conference in Software Engineering for Defence Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 422))

Abstract

On last December 2014, Security brokers (SB)—“Targeted Threats Team”—successfully completed a full analysis, which started back on January 2013, operating over 24 months of deep research and data correlation. Analyzing those main and biggest security incidents and data breaches occurred over the last ten years, starting from the faraway year 2004. The lesson learned was quite impressive and may somehow shake the modus operandi and the mental approach we are used to. This paper aims to recap those key points emerged from that research project, and those new logics we should internally apply within our organizations over the next months and upcoming years. This paper aims to provide, on its first section, the so-called big picture toward those main threats linked with information theft and leaks, and Web defacements, along with those consequent impacts on organizations, through keywords such as Cyber Intelligence, both from open and from closed sources. The second section of the paper provides a general overview of the importance of the so-called secure programming and on those typical mistakes that pop-up when running security testing projects, and advanced penetration testing activities, toward Web applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. “World’s biggest data breach”: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

  2. Australian Signals Directorate “Strategies to Mitigate Targeted Cyber Intrusions”: http://www.asd.gov.au/infosec/top-mitigations/mitigations-2014-table.htm

  3. Cyber open source Intelligence portal: https://brica.de/

  4. Slow loris DoS: http://it.wikipedia.org/wiki/Slowloris

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco De Luca Saggese .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chiesa, R., De Luca Saggese, M. (2016). Data Breaches, Data Leaks, Web Defacements: Why Secure Coding Is Important. In: Ciancarini, P., Sillitti, A., Succi, G., Messina, A. (eds) Proceedings of 4th International Conference in Software Engineering for Defence Applications. Advances in Intelligent Systems and Computing, vol 422. Springer, Cham. https://doi.org/10.1007/978-3-319-27896-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27896-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27894-0

  • Online ISBN: 978-3-319-27896-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics