Q
Problem solve Get help with specific problems with your technologies, process and projects.

How can I tell if my software security has been breached?

Software security expert unveils the tell-tale signs of an application security breach and points to helpful resources on preventing app security mishaps.

What are the tell-tale signs of a software security breech?

The possibilities are endless depending on which perspective you're looking at things from. You might have high...

utilization on the server's network card or the backend database. You might see numerous locked accounts that occurred as the result of a password cracking attempt. Your Web server and application log files may point to abuse in the form of repeat requests and non-standard requests. Or, you may be notified by a customer, a business partner or a law enforcement that something has gone awry. This is why getting all the right people on board with security and monitoring for the things that matter is so important.

I've written a number of tips on how to prevent software hacker's malicious attempts, here are some that come to mind:

I have always been of the opinion that "the best offense is a good defense," especially when it comes to computers and software. Retaking control of hacked systems and software is naturally an uphill battle and one that can't always be won. Whereas proper security steps in the beginning can win the war for you before your enemies even strike.

This was last published in October 2009

Dig Deeper on Software Security Test Best Practices

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchMicroservices

TheServerSide.com

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

DevOpsAgenda

Close