Abstract
On last December 2014, Security brokers (SB)—“Targeted Threats Team”—successfully completed a full analysis, which started back on January 2013, operating over 24 months of deep research and data correlation. Analyzing those main and biggest security incidents and data breaches occurred over the last ten years, starting from the faraway year 2004. The lesson learned was quite impressive and may somehow shake the modus operandi and the mental approach we are used to. This paper aims to recap those key points emerged from that research project, and those new logics we should internally apply within our organizations over the next months and upcoming years. This paper aims to provide, on its first section, the so-called big picture toward those main threats linked with information theft and leaks, and Web defacements, along with those consequent impacts on organizations, through keywords such as Cyber Intelligence, both from open and from closed sources. The second section of the paper provides a general overview of the importance of the so-called secure programming and on those typical mistakes that pop-up when running security testing projects, and advanced penetration testing activities, toward Web applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
“World’s biggest data breach”: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Australian Signals Directorate “Strategies to Mitigate Targeted Cyber Intrusions”: http://www.asd.gov.au/infosec/top-mitigations/mitigations-2014-table.htm
Cyber open source Intelligence portal: https://brica.de/
Slow loris DoS: http://it.wikipedia.org/wiki/Slowloris
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Chiesa, R., De Luca Saggese, M. (2016). Data Breaches, Data Leaks, Web Defacements: Why Secure Coding Is Important. In: Ciancarini, P., Sillitti, A., Succi, G., Messina, A. (eds) Proceedings of 4th International Conference in Software Engineering for Defence Applications. Advances in Intelligent Systems and Computing, vol 422. Springer, Cham. https://doi.org/10.1007/978-3-319-27896-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-27896-4_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27894-0
Online ISBN: 978-3-319-27896-4
eBook Packages: EngineeringEngineering (R0)