Unit 4 – Lesson 5 – “Data – Software”
6 Days
In every data state, software is essential for authorized access, data control, and policy compliance. Software is a complex set of inputs, instructions, and outputs that could behave unexpectedly and allow unauthorized people to bypass the controls and violate the security policies. This unexpected behavior, or a vulnerability, could result during the design, during the development, or during an unanticipated use of software. Adversaries’ objective is to exploit these vulnerabilities. Patching vulnerabilities is imperative to prevent exploits and help to restore the highest level of data protection in a system. This lesson will explore common software vulnerabilities and provide hands-on experiences in vulnerability scanning, SQL injection, and buffer overflow.