Understanding security audit
It’s early in the morning at your job as a software developer for the Jim Bob Circle Pants Online Calendar (JBCPCalendar.com
), and you’re halfway through your first cup of coffee when you get the following email from your supervisor:
Figure 1.2 – The email from the supervisor
What? You didn’t think about security when you designed the application? In fact, at this point, you are not even sure what a security audit is. Sounds like you’ll have a lot to learn from the security auditors! Later in this chapter, we will review what an audit is, along with the results of an audit. First, let’s spend a bit of time examining the application that’s under review.
Exploring the example application
Although we’ll be working through a contrived scenario as we progress through this book, the design of the application and the changes that we’ll make to it are drawn from the...