Application Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Application Security by Mind Map: Application Security

1. Biometric

1.1. Static

1.1.1. Fingerprint recognition

1.1.2. Retinal scan

1.1.3. Iris scan

1.1.4. Hand geometry

1.2. Dynamic

1.2.1. Signature recognition

1.2.2. Speaker recognition

1.2.3. Keystroke dynamics

2. Ftp

2.1. A user of an FTP program must log in to both hosts in order to transfer a file from one to the other.

3. Http

3.1. Propagation phase

3.2. Teigerring phase

3.3. Execution phase

4. Email

4.1. Security in email

4.1.1. Confidentiality

4.1.2. Data origin authentication

4.1.3. Message integrity

4.1.4. Non-repudiation of origin

4.1.5. Key management

4.2. Threats

4.2.1. Threats to the email itself

4.2.1.1. Loss of confidentiality

4.2.1.2. Lack of data origin authentication

4.2.2. Threats enabled by email

4.2.2.1. Active content attack

4.2.2.2. Buffer over-flow attack

4.2.2.3. Shell script attack

4.2.2.4. Teojan horse attack

4.2.2.5. Web bugs

5. Web

5.1. Includes

5.1.1. Security of server

5.1.2. Security of client

5.1.3. Network traffic security

5.2. Web servers

5.2.1. Static content model

5.2.2. Dynamic content model

5.2.3. Can have mixtures

5.3. Vulnerabilities

5.3.1. Replace static content

5.3.2. Denial of service attack

5.3.3. Unauthorized database access

5.3.4. Attack server OS / other services