sponsored by Klocwork
Premiered:  Nov 8, 2013
Format:  Multimedia
Type:  Webcast
Language:  English

In this course, we will look at CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere.

The course begins with an overview of the weakness caused by exposure of system data to an unauthorized control sphere. The course describes the security impact of the weakness and a technical description of the issue at hand is presented along with code examples to demonstrate the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-497.

At the end of this course, you will be able to:

  • Describe the weaknesses caused when an application exposes system information to untrusted entities.
  • Explain the security impact of system data exposure to an unauthorized control sphere.
  • Describe how sensitive data in error messages and differences in error messages can enable security attacks.
  • Describe the remediation strategies to mitigate the weaknesses described by CWE-497.

Application Life-Cycle Management | Application Security | Code Management | Data Security

View All Resources sponsored by Klocwork

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement