3 Threat of “Cyber” So Apostolic Application Developer

Application security firm F5 Networks announced the results of its latest research titled State of Application Delivery 2017. The results show that there are three cyber threats that are currently a scourge for application makers.

From a variety of attacks, the top three that are estimated to be much sought for protection are Domain Name System Security Extension (DNSSEC) attacks about 25 percent, Distributed Denial of Service (DDoS) about 21 percent, and Web Application Firewall (WAF) about 20 percent.

The conclusion, as stated Country Manager F5 Networks, obtained based on a survey conducted on 2156 respondents. Each is a person who works in the information technology sector, such as application developers, chief technology officers, and chief information officers or corporate IT employees.

one of the triggers to increase the need for cyber protection is the rapid development of telecommunications and mobile application development company. As the access of 4G networks opens, operators’ revenue from phone services is reduced and forcing them to innovate in services using the internet or data.

For example, the innovation is about creating new apps that simplify the lives of its users. Well, the problem is not all applications have the same level of security and there are likely to be vulnerable.

“With the increasing number of smartphones, the ease of access using the application, the cybersecurity is also more vulnerable. Ease of access is like a house, if anyone can easily enter, then the security is more vulnerable, “he explained when talking with a number of media in the world.

“Applications need more strict guarding. Therefore, based on the survey, we found the protection will be three major trends this year, “he added.

To note, DNSSEC is a set of tools that can secure various information from DNS, while DDoS is an effort to flood a service with false requests so as to make connections disrupted, and attacks on WAF can be exemplified by deface actions or change the look of a site.

F5 position itself is like a gatekeeper. His security system is in the middle of the path that connects the company owner of the application with the cloud custom software development services used by the owner of the application.

F5 can detect whether a request (submitted by a user through a company-made application) is harmful or not. In addition, F5 also has a central controller that is able to detect the origin of various ongoing attacks.