top of page
71OMr0D4FrL._SL1500_.jpg
119159849_10158061653118813_5314694876572739015_n.jpg
71eSH5cSYiL._SL1377_.jpg
final.png

CISSP Study Plan – Day 5 of 55 | SDLC Attacks on Software Security


"You have surrounded yourself with CISSP , and soon success will come running to you."

- Luke Ahmed



Today is Day 5 of Yihenew’s CISSP study plan, continuing with Systems Development Security, but now shifting the focus toward attacks on software security.

Key Areas Covered:

  • Injection Attacks — SQL injection, command injection, and input validation weaknesses that let attackers manipulate application behavior

  • Buffer Overflows — exploiting poor memory management to execute arbitrary code

  • Race Conditions — manipulating timing to access resources in an unsafe sequence

  • Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF) — exploiting trust between a user and a web application

  • Backdoors & Logic Bombs — malicious code inserted intentionally or hidden in applications, waiting for the right trigger

In this CISSP study plan session, Yihenew reinforced that understanding common software attack vectors is just as important as knowing secure development practices. Recognizing how attackers think helps you design countermeasures early in the lifecycle—closing the door before exploits can even be attempted.

If you’re building your own CISSP preparation plan, these software attack concepts are critical for mastering the Systems Development Security domain and directly tie into Security Engineering and Software Development Security on the exam.


Follow his full journey on TikTok or check out Day 6.


Yihenew's Resources in the Video:


Course


Practice Questions

 
 
  • Youtube
  • Instagram
  • Linkedin
  • Facebook
  • TikTok
bottom of page