• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

“Businesses Sacrifice Security to Get Apps Released Faster”

October 12, 2016 by Mengqi He 2 Comments

Recently, many organizations that struggled to deliver strong protection under the pressure of the app economy, decided to compromise on security to get apps released faster. This would be a great risk to both companies and their customers or app users. Since the app economy is bringing new cyber security challenges, companies should increase the complexity of their security practice to better protect customer’s information against attacks, instead of cutting corners. Customers also expect rapid and secure experiences. If they think that app is not secure, they would switch to an alternative app immediately. One way the article mentioned to respond to the new challenges of app economy is identity-centric security. The identity-centric approach uses behavioral analytics and predictive strategies to verify identities and mange identity-related activities without sacrificing the customer experience. In addition, the security team must work together with app development team in every phase of the development process to ensure security is integrated into the app.

Security is usually the greatest concern on e-commerce and e-banking. Even though the company is under intense pressure due to fierce competition in the market and the rising demand of customers. It is obviously not a wise decision to compromise on security for faster release. This compromise will cause serious risks to the company. The app will be vulnerable to hacking or malicious attacks, and hackers may steal customers’ information or credentials for financial purpose or illegal use. Therefore, the company may involve into litigations. Their reputation may be damaged and customers will switch to other apps since there are so many similar apps available in the market. The risk of loss outweighs the benefit of faster release.

 

Link: http://www.darkreading.com/application-security/businesses-sacrifice-security-to-get-apps-released-faster/d/d-id/1327151

Filed Under: Week 07: NetCat and HellCat Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    October 12, 2016 at 11:27 am

    Interesting article Mengqi. Companies should do the contrary, making sure their apps are secured before releasing it to the public It doesn’t matter how fast an app is release, if it has security flaws than it will be a terrible product and customers will not use it. Better to be slow and secured, than fast and flawed. As security is now a hot topic, hopefully companies will take their times and build secure apps.

    Log in to Reply
  2. Mauchel Barthelemy says

    October 14, 2016 at 7:44 pm

    Compromising security for faster release is definitely not they way to go for obvious reasons Ahmed highlighted above. Ahmed is 100% correct when he mentions that risks of loss outweigh the benefits of faster release. It all may sound no big deal at the beginning, but this is a catastrophe crisis in the making when many prominent financial institutions engage in such bad practice. Hackers will eventually find out about those vulnerabilities and create a common practice to take advantage of them at one. This is what will transform the outcome into this a big crisis. By the time companies that compromise security realize it, this will become difficult to recover from losing a lot of money, consumers’ money and PFIs.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in