Back to Search Start Over

Developers' growing challenge.

Authors :
Coffee, Peter
Source :
eWeek. 5/16/2005, Vol. 22 Issue 20, pD1-D8. 3p. 2 Color Photographs, 2 Charts.
Publication Year :
2005

Abstract

This article focuses on how enterprise application developers are squarely in the cross hairs of the next generation of information technology system attacks. As generic infrastructure security and user awareness issues are increasingly addressed, the most dangerous remaining and newly arising vulnerabilities are those in the applications that define any modern organization's procedures and controls. When perimeter security is lax, attackers will exploit promiscuous connectivity or weak password discipline; when users are careless and/or clueless, opportunistic attacks such as e-mail worms will have free rein. In the current environment, though, there are three reasons that line-of-business applications are ever-more-attractive targets. Supply chain pressures dictate that enterprise online presence, in the form of network-facing applications, must be accessible to the largest possible number of potential users and must meet aggressive targets for rapid development and deployment. Application developers thus find themselves under pressures that lead to the creation of systems with numerous and subtle flaws that are forbiddingly costly to fix. INSETS: Developers in the cross hairs;Where to look for application weakness.

Details

Language :
English
ISSN :
15306283
Volume :
22
Issue :
20
Database :
Academic Search Index
Journal :
eWeek
Publication Type :
Periodical
Accession number :
17089155