A Neural Network For Factoid Question Answering Over Paragraphs

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

CERT-In

Cybersecurity
PS-3
Approach for application development leading to apps with
features to detect, report and respond to attempt of attacks
Secure Software Engineering Approach
Design Phase
Design Phase
• Iterative Collaboration between System Engineering team, a Red team, and a Blue
team.
• System Engineering team crafts the high level system design involving system
architecture and functional description.
• Blue team performs Operational Risk Assessment producing the consequence
analysis and prioritized list of undesirable functional outcomes, on which the
System Engineering team would derive potential resilience solutions.
Design Phase
• Red Team considers various attack scenarios to identify vulnerabilities that
malicious actors might exploit and consider various defense strategies.
• Adjustments to the system design based on the feedback received, are made, which
may result in revisiting previous steps to refine potential risks and solutions.
• Iterative collaboration makes security an integral part of the design phase.
Development Phase
Secure Foundation
• To make application which can detect, report, and respond to threats. We need its
development to be in a secure environment.
• Thus, our approach focuses on identifying vulnerabilities in third-party packages
and dependencies and implementation of a library integrated with security-
conscious methods.
• The library would have secured variables, function and rigorously designed data
structures incorporating secure allocation and deallocation methods preventing
memory leaks.
• It would also enforce strict data validation and input sanitization policies within to
prevent vulnerabilities and empower developers to build robust and resilient
applications.
Thank You!

You might also like