Static application security testing: Difference between revisions

Content deleted Content added
Overview: fix serious wording error
Tags: Mobile edit Mobile web edit Advanced mobile edit
Tags: Mobile edit Mobile web edit Advanced mobile edit
Line 132:
}}</ref>
 
Since late 90s, the need forto adaptabilityadapt to business challenges transformshas thetransformed software development into awith componentization of software.<ref>
{{Cite journal
|last1=Booch |first1=Grady
Line 158:
|publisher=Information Systems Management
|doi=10.1201/1078.10580530/46108.23.3.20060601/93704.3
}}</ref>.
Following the flawflow of data amongbetween all the components of an application or group of applications allows tovalidation validate thatof required calls to dedicated procedures for [[Code_injection#Preventing_problems|sanitization]] and that proper actions are taken to taint data in specific pieces of code.<ref>
{{Cite journal
|last1=Livshits|first1=V.B.
Line 181:
|doi=10.1109/SP.2006.29
|isbn=0-7695-2574-1
}}</ref>.
 
The rise of web applications implied a focus onentailed testing them: it is reported by Verizon Data Breach reports that 40% of all data breaches{{when}} were achieved usinguse web application vulnerabilities.<ref>{{cite web |url= https://enterprise.verizon.com/resources/reports/2016/DBIR_2016_Report.pdf |title= 2016 Data Breach Investigations Report |date = 2016}}</ref>.
AtAs thewell opposite ofas external security validations, there is a rise in focusingfocus on internal threats. It is reported by theThe Clearswift Insider Threat Index (CITI) has reported that 92% of their respondents in a 2015 survey thatsaid they had experienced IT or security incidents in the pastprevious 12 months and that 74% of these breaches were originated by insiders.<ref>{{cite web |url= http://pages.clearswift.com/rs/591-QHZ-135/images/Clearswift_Insider_Threat_Index_2015_US.pdf |title= Clearswift Insider Threat Index (CITI) |date=2015}}</ref>. Lee Hadlington categorized internal threats in 3 categories: Maliciousmalicious, Accidentalaccidental, and Unintentionalunintentional. Mobile applications' growingexplosive explosivelygrowth implies securing applicationapplications earlier in the development process to reduce malicious code development.<ref>
{{Cite journal
|last1=Xianyong|first1=Meng
Line 198:
|doi=10.1109/ISNCC.2018.8531071
|isbn=978-1-5386-3779-1
}}</ref>.
 
==SAST strengths==