O'Reilly logo

Application Security in the ISO27001 Environment by Anbalahan Siddharth, Pakala Sangit, Shetty Sachin, Ummer Firosh, Mangla Anoop, Vasudevan Vinod

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Introduction to Application Security Threats

All businesses today use software automation to streamline their core functions – selling, procuring, production and customer relationship management.

People performing these functions make use of data to perform their work. For example, employees working in a bank use customers’ account balances to clear issued-cheques, to create account statements or to calculate interest paid. The data, the customers’ account balance in this case, is fundamental for this function of the bank. Any loss or inaccuracy of customers’ account balances will jeopardise the bank’s functioning. Similarly, since customers’ account balances are important data, a bank wants only authorised people to have access to it, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required