FINAL PROJECT:Structures and Arguments > A guide to common security vulnerabilities and how to prevent them

Beginning: The beginning will start out with an anecdote of one of the companies recently affected by a data leak. One recent example of this is the Cloudflare vulnerability which caused passwords to be released in plain text from websites protected by Cloudflare. Since the guide is aimed towards programmers, it will highlight the monetary damage to Cloudflare caused by this bug. Hopefully this will highlight the importance

Middle: The next part will start by mentioning the OWASP top 10, which is a reliable source on the most common vulnerabilities found in web applications as of 2017 (the last time it was updated). It will present the top 3 with examples of how to exploit the vulnerabilities on the surface, and methods of prevention. The three methods include: Injection (specifically SQL injection and command injection will be shown), Broken Authentication and Session Management (using public keys multiple times allowing a Chinese remainder theorem attack), and cross site scripting (specifically reflected)

End: The end will go over methods of prevention for more than just the top 3, and general guidelines to follow for creating secure applications.
LOGOS: Data leaks can lead to lawsuits -> can destroy a small business -> may get you fired if survives

PATHOS: Highlight importance of not losing customer data, how terrible it feels to be hacked and to have everyone look down on your company.

ETHOS: Cite OWASP as the head of current security vulnerabilities, and cite own participation in wide variety of CTF’s as past experience in hacking.

STRUCTURE: The structure will be that of an informative guide with examples showing how each vulnerability works

GOAL: Make programmers more mindful of the risks they introduce into their applications, and teach people to write secure code from the start instead of leaving it for later and then forgetting as is common.
May 2, 2017 | Unregistered CommenterTal D.
Tal, I like the use of specific cases to instruct and illustrate. Will your general guidelines include directions formatting?

Will you use third person voice?

Also, do not forget to round out your sources. You can use the annotated bibliography to support your readers, but sending them to credible sources for further reading.
May 5, 2017 | Registered CommenterMarybeth Shea