WEBVTT

00:00.570 --> 00:06.780
Web applications are hugely attractive to hackers for a million different reason especially when these

00:06.780 --> 00:10.280
web applications are mismanaged and patched.

00:10.320 --> 00:18.510
Thus they become very easy target to attack security flaws at a high level can be nuts identifying security

00:18.510 --> 00:25.020
requirements upfront and usually in this case security comes as complimentary thing at the end of the

00:25.020 --> 00:25.560
project.

00:25.560 --> 00:32.790
This is a totally false practice creating designs which have logic errors and this is usually the case

00:32.790 --> 00:39.540
and happens all the times using poor coding practices and not abiding by security benchmarks and best

00:39.540 --> 00:43.720
practices introduces technical vulnerabilities in their web application.

00:43.730 --> 00:49.920
Deploying the software improperly with maybe configuration errors and configuration mistakes will make

00:49.920 --> 00:56.580
your application prone to being hacked and introducing flaws during maintenance or a beating as well

00:56.580 --> 00:58.670
introduces lots of these flaws.

00:58.890 --> 00:59.980
So how bad is it.

01:00.000 --> 01:05.780
Actually this is a summary of different reports from different sources such as watch fire.

01:05.810 --> 01:15.660
Gartner just wave and it says that like 97 percent of Web applications audited their by watch fire are

01:15.780 --> 01:16.380
vulnerable.

01:16.380 --> 01:22.340
Gardner says that 75 percent of the attacks today are happening at the application level.

01:22.380 --> 01:30.090
So as you can see the majority of the attacks on the vulnerabilities lie at the application level.

01:30.180 --> 01:36.810
What are the categories on Web sites or to get degrees of the malware that lie on the Web sites out

01:36.840 --> 01:37.140
there.

01:37.140 --> 01:42.780
Actually you can see that Trojan Horse malware dominates the area.

01:42.780 --> 01:47.460
It's like 70 percent of all the malware is there are Trojan horses.

01:47.460 --> 01:49.120
Next come the backdoor.

01:49.140 --> 01:53.780
Then the viruses than the ad whereas and then the worms.

01:53.790 --> 01:58.770
Here is a list of the most popular CNS or the content management system on the web.

01:58.800 --> 02:06.270
So obviously it's clear to you that would press is the Internet number one most popular CNS and it is

02:06.270 --> 02:08.540
the number one target for hackers.

02:08.550 --> 02:13.340
It is an easy target for hackers WordPress hacking software is a lot out there.

02:13.340 --> 02:18.420
And during this course we will introduce one of the applications on Kelly on top of that.

02:18.480 --> 02:26.880
You realize that these popular CRM s they use BHP so we can say that BHP as well dominates the Internet.
