<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; CS@Worcester</title>
	<atom:link href="https://cs.worcester.edu/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://cs.worcester.edu</link>
	<description>Worcester State University Computer Science Department</description>
	<lastBuildDate>Tue, 23 Dec 2025 03:34:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
<site xmlns="com-wordpress:feed-additions:1">236835116</site>	<item>
		<title>Security Best Practices for Web Applications</title>
		<link>https://bforbuild.dev/blog/security-best-practices-web-apps</link>
		
		<dc:creator><![CDATA[BforBuild]]></dc:creator>
		<pubDate>Tue, 23 Dec 2025 03:34:36 +0000</pubDate>
				<category><![CDATA[authentication]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[nist]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[web-development]]></category>
		<guid isPermaLink="false">https://bforbuild.dev/blog/security-best-practices-web-apps</guid>

					<description><![CDATA[A comprehensive guide to web application security covering OWASP Top 10, authentication, encryption, input validation, security headers, and compliance standards.]]></description>
										<content:encoded><![CDATA[<div class="article-content">
<h2>Introduction to Web Application Security</h2>
<p>In today&#8217;s digital landscape, web application security is not optional—it&#8217;s essential. Every day, applications face threats ranging from automated bots to sophisticated cyberattacks. Security should be integrated into every phase of the development lifecycle, from initial design to deployment and maintenance.</p>
<p>This comprehensive guide covers essential security practices that every web developer and organization should implement to protect their applications, users, and data. We&#8217;ll explore industry standards, common vulnerabilities, and practical solutions based on OWASP guidelines and NIST recommendations.</p>
<h2>The OWASP Top 10: Critical Security Risks</h2>
<p>The OWASP Top 10 is a standard awareness document representing the most critical security risks to web applications. Understanding and addressing these vulnerabilities is fundamental to building secure applications.</p>
<h3>1. Broken Access Control</h3>
<p><strong>What it is:</strong> Access control enforces policies that prevent users from acting outside their intended permissions. Broken access control occurs when restrictions on authenticated users are not properly enforced.</p>
<p><strong>Prevention strategies:</strong></p>
<ul>
<li>Implement principle of least privilege—users should only have access to resources they absolutely need</li>
<li>Use role-based access control (RBAC) with clear permission hierarchies</li>
<li>Validate access rights on every request, not just the UI</li>
<li>Implement proper session management and timeout mechanisms</li>
<li>Use server-side validation for all authorization checks</li>
<li>Log all access control failures and monitor for suspicious patterns</li>
</ul>
<h3>2. Cryptographic Failures</h3>
<p><strong>What it is:</strong> Previously known as &#8220;Sensitive Data Exposure,&#8221; this category focuses on failures related to cryptography that often lead to sensitive data exposure.</p>
<p><strong>Prevention strategies:</strong></p>
<ul>
<li>Encrypt all sensitive data at rest using AES-256-GCM encryption</li>
<li>Use HTTPS/TLS 1.3 for all data in transit</li>
<li>Never store passwords in plain text—use bcrypt, Argon2, or PBKDF2 with sufficient rounds</li>
<li>Implement proper key management—rotate keys regularly and store them securely</li>
<li>Disable caching for sensitive data</li>
<li>Use strong, industry-standard cryptographic algorithms</li>
<li>Implement proper certificate management and validation</li>
</ul>
<h3>3. Injection</h3>
<p><strong>What it is:</strong> Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query, tricking the interpreter into executing unintended commands.</p>
<p><strong>Prevention strategies:</strong></p>
<ul>
<li>Use parameterized queries and prepared statements (Prisma ORM, Sequelize)</li>
<li>Implement input validation using whitelisting, not blacklisting</li>
<li>Use ORMs that automatically escape inputs</li>
<li>Sanitize all user inputs before processing</li>
<li>Implement Content Security Policy (CSP) to prevent XSS</li>
<li>Use least-privilege database accounts</li>
<li>Validate and sanitize file uploads</li>
</ul>
<h2>Conclusion</h2>
<p>Security is not a one-time task but an ongoing process. It requires continuous attention, regular updates, and a security-first mindset throughout the development lifecycle. By implementing these best practices, following industry standards like OWASP and NIST, and maintaining vigilance, you can significantly reduce the risk of security breaches and protect your users and data.</p>
<p><strong>Remember:</strong> Security is a process, not a product. Stay informed about new threats, keep your systems updated, and always prioritize security in your development practices.</p>
<p>For more information, visit the <a href="https://owasp.org/www-project-top-ten/"  rel="noopener noreferrer">OWASP Top 10</a> and <a href="https://www.nist.gov/cyberframework"  rel="noopener noreferrer">NIST Cybersecurity Framework</a>.</p>
</p></div>

<p class="syndicated-attribution"><em>From the blog <a href="https://bforbuild.dev">BforBuild</a> by <a href="https://cs.worcester.edu/author/0/" title="Read other posts by BforBuild">BforBuild</a></em> and used with permission of the author. All other rights reserved by the author.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">50267</post-id>	</item>
		<item>
		<title>Security Testing</title>
		<link>https://insandoutsofsoftwaretesting.wordpress.com/2024/05/23/security-testing/</link>
		
		<dc:creator><![CDATA[Jaylon Brodie]]></dc:creator>
		<pubDate>Thu, 23 May 2024 18:10:38 +0000</pubDate>
				<category><![CDATA[CS-443]]></category>
		<category><![CDATA[CS@Worcester]]></category>
		<category><![CDATA[cyber-security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ethical-hacking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Testing]]></category>
		<category><![CDATA[Software Quality Assurance]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">http://insandoutsofsoftwaretesting.wordpress.com/?p=72</guid>

					<description><![CDATA[In software development security testing is very important to making sure applications are strong enough against cyber attacks. Security testing encompasses a variety of practices like, application security testing, and penetration testing. Overview of Security testing For this blog post, I chose the article ” Security Testing from Bright Security. The article provides a lot […]]]></description>
										<content:encoded><![CDATA[<p>In software development security testing is very important to making sure applications are strong enough against cyber attacks. Security testing encompasses a variety of practices like, application security testing, and penetration testing. </p>
<p class="has-large-font-size"><strong>Overview of Security testing</strong></p>
<p>For this blog post, I chose the article &#8221; Security Testing from Bright Security. The article provides a lot of insight on security testing, it&#8217;s goal, benefits of security testing, key principles, and the different types of security testing. </p>
<p>1.) <strong>Goals</strong>: The article showcases the main goals of security testing, which are realizing what assess needs protection, identifying the potential threats and vulnerabilities, evaluate the risks that come with the vulnerabilities. </p>
<p>2.) <strong>Key Principles</strong>: The article covers the main key principles of security testing, which are availability, integrity, authentication, and authorization. These principles make sure that important/sensitive information is accessed only by authorized users, and that it remains accurate and trustworthy. </p>
<p>3.) <strong>Different types of Security Testing</strong>: </p>
<p><strong>. Penetration Testing</strong>: This security testing method replicates real world cyber attacks to test the effectiveness of already existing security measures. </p>
<p>. <strong>Application Security Testing</strong>: This security testing method finds and eliminates the vulnerabilities within software applications. </p>
<p>. <strong>Web Application Security Testing</strong>: This security testing methods test different techniques that gauges the vulnerability of web applications. </p>
<p>. <strong>Security Audits and risks Assessment</strong>: This is a test method that checks to make sure that everything is structured properly and in compliance with the rules/standards. </p>
<p class="has-medium-font-size">4.) <strong>Benefits of Security Testing</strong>: </p>
<p><strong>. Early Detection of Vulnerabilities</strong>: Security testing allows for the early recognition of potential security issues, reducing the risk of exposure.</p>
<p><strong>. Risk Management</strong>: When the vulnerabilities are identified, then we can create solutions to solve the risks of a cyber attack or data leak. </p>
<p><strong>. Trust and Cost Efficient</strong>: Early detection of risks and vulnerabilities will  not only enhance the rust of customers but it will significantly reduce the cost of a data breach and various fines. </p>
<p class="has-large-font-size"><strong>Why I picked this Resource</strong></p>
<p>I picked this resource because it provided a comprehensive and detailed overview of Security Testing. This Article had a lot of similarities with the topics that we covered in our course. Also, the article makes it easier to understand the nature of security testing and various practices and principles associated with it. </p>
<p class="has-large-font-size"><strong>Personal Reflection</strong></p>
<p>Reading this article expanded my understanding of security testing beyond what we learned in class. I learned how important it is to just about everything related to technology. Identifying threats, risks, and vulnerabilities and how each of these things come together to reduce cyber attacks. One thing that I can takeaway from this is learning about the various types of Security Testing and each one does something different, but all have a similar goal. </p>
<p>In my future endeavors, I plan on using what I have learned about these Security Testing principles by implementing them on future projects. This new found knowledge will help me to make better decisions in the future. </p>
<p><strong>The full Article is here</strong>: <br /><a href="https://brightsec.com/blog/security-testing/">https://brightsec.com/blog/security-testing/</a></p></p>

<p class="syndicated-attribution"><em>From the blog <a href="https://insandoutsofsoftwaretesting.wordpress.com">CS@Worcester – In&amp;#039;s and Out&amp;#039;s of Software Testing</a> by <a href="https://cs.worcester.edu/author/0/" title="Read other posts by Jaylon Brodie">Jaylon Brodie</a></em> and used with permission of the author. All other rights reserved by the author.</p>]]></content:encoded>
					
		
		<enclosure url="https://2.gravatar.com/avatar/8e8aa43fe934d8a68933daf5ee7d9b35c1afde97eb63787e803f806eebb88f6b?s=96&#038;d=identicon&#038;r=G" length="0" type="" />

		<post-id xmlns="com-wordpress:feed-additions:1">21616</post-id>	</item>
		<item>
		<title>Pairwise and Combinatorial Testing</title>
		<link>https://insandoutsofsoftwaretesting.wordpress.com/2024/02/25/pairwise-and-combinatorial-testing/</link>
		
		<dc:creator><![CDATA[Jaylon Brodie]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 04:06:49 +0000</pubDate>
				<category><![CDATA[CS-443]]></category>
		<category><![CDATA[CS@Worcester]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[JUnit]]></category>
		<category><![CDATA[Software Quality Assurance]]></category>
		<category><![CDATA[TDD]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[Week 6]]></category>
		<guid isPermaLink="false">http://insandoutsofsoftwaretesting.wordpress.com/?p=61</guid>

					<description><![CDATA[The article “Combinatorial Testing” focuses on the insights of software testing methods. This article explores the evolution of combinatorial testing, talking about advancements in algorithm performance and constraint representation. The article also talks about the importance in detecting interaction failures within software systems. The article also demonstrates the effectiveness of t-way combinations fault detection across […]]]></description>
										<content:encoded><![CDATA[<p>The article &#8220;Combinatorial Testing&#8221; focuses on the insights of software testing methods. This article explores the evolution of combinatorial testing, talking about advancements in algorithm performance and constraint representation. The article also talks about the importance in detecting interaction failures within software systems. The article also demonstrates the effectiveness of t-way combinations fault detection across various domains. The article &#8220;Pairwise Testing&#8221; talks about pair testing as a permutation and combination technique aimed at testing each pair of input parameters to ensure that the system if functioning properly across all possible combinations. The article also addresses the many benefits of pairwise testing and it&#8217;s role in reducing test execution time and cost while maintaining test coverage. Also, it talks about the challenges associated with pairwise testing, including the limitations in detecting interactions beyond pairwise combinations. </p>
<p class="has-large-font-size"><strong>Pairwise Testing </strong></p>
<p>pairwise testing is a software testing method that aims to comprehensively validate the behavior of a system by testing all possible pairs of input parameters. This method is mainly used when many of the defects in software systems are triggered by interactions between pairs of input parameters, rather than by individual parameters in isolation. </p>
<p class="has-large-font-size"><strong>Benefits &amp; Challenges</strong></p>
<p>some benefits that pairwise offers is, efficiency: by testing the combinations of two input parameters at a time. This reduce&#8217;s the number of test cases required compared to exhaustive testing. pairwise testing also offers effective defect detection: by effectively  finding defects that are triggered by interactions between pairs of input parameters, pairwise testing also helps to identify certain scenarios by systematically exploring pairs of parameters. Some challenges that pairwise testing may face is when it comes to parameter selection. Selecting the right parameters is crucial and requires a lot of knowledge of the software and it&#8217;s potential interaction scenarios. If the wrong parameter is selected this can lead to incomplete test coverage and missed defects. </p>
<p class="has-large-font-size"><strong>Combinatorial Testing </strong></p>
<p>Combinatorial testing is a software testing technique that focuses on efficiently testing the interactions between different input parameters of a system. This test method involves generating a set of test cases that include various combinations of input values / specific parameter values. </p>
<p class="has-large-font-size"><strong>Benefits &amp; Challenges</strong></p>
<p>Some benefits of combinational testing include improved software quality: by being able to identify and address the interaction failures early in the development process. This test method tests various combinations of input parameters, which can help find defects that could impact the systems performance. A challenge that combinational testing may face is the scalability. Combinatorial testing is effective for small to medium sized systems and when scaling it to large and complex systems with a high number of input parameters and values, you may run into some problems. </p>
<p class="has-large-font-size"><strong>Why did I pick this Article? </strong></p>
<p>I pick these two article that talk about pairwise and combinatorial testing because both these test methods stand at the forefront of software test methods. The article&#8217;s goes into details about how both of these test methods offer an efficient way to ensure comprehensive test coverage while minimizing redundancy. Both of these articles have taught me a lot about pairwise and combinational testing. </p>
<p class="has-large-font-size"><strong>Reflection</strong></p>
<p>After reading both of these articles, I have gained a greater understanding of both these test cases. With the new found knowledge, I aspire to apply pairwise and combinatorial testing techniques in my future projects. Both these test methods offer practical solutions to common testing challenges, and by incorporating them into my future endeavors I aim to contribute to the development of reliable software systems. </p>
<p>Article link is here: <a href="https://www.sciencedirect.com/science/article/abs/pii/S0065245815000352">https://www.sciencedirect.com/science/article/abs/pii/S0065245815000352</a></p>
<p><a href="https://testsigma.com/blog/pairwise-testing/" rel="nofollow">https://testsigma.com/blog/pairwise-testing/</a></p></p>

<p class="syndicated-attribution"><em>From the blog <a href="https://insandoutsofsoftwaretesting.wordpress.com">CS@Worcester – In&amp;#039;s and Out&amp;#039;s of Software Testing</a> by <a href="https://cs.worcester.edu/author/0/" title="Read other posts by Jaylon Brodie">Jaylon Brodie</a></em> and used with permission of the author. All other rights reserved by the author.</p>]]></content:encoded>
					
		
		<enclosure url="https://2.gravatar.com/avatar/8e8aa43fe934d8a68933daf5ee7d9b35c1afde97eb63787e803f806eebb88f6b?s=96&#038;d=identicon&#038;r=G" length="0" type="" />

		<post-id xmlns="com-wordpress:feed-additions:1">20680</post-id>	</item>
	</channel>
</rss>
