Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Application security for system administrators

As a system administrator, you play a critical role in the security of your organization’s applications. You are responsible for managing the systems that applications run on and for protecting those systems from attack. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

March 7, 2023 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo