<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jahin Justin</title>
    <description>The latest articles on DEV Community by Jahin Justin (@jahinjusitn).</description>
    <link>https://dev.to/jahinjusitn</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1193930%2F124db192-687c-4ab9-8068-256bf051b6d0.jpeg</url>
      <title>DEV Community: Jahin Justin</title>
      <link>https://dev.to/jahinjusitn</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jahinjusitn"/>
    <language>en</language>
    <item>
      <title>VA &amp; PM</title>
      <dc:creator>Jahin Justin</dc:creator>
      <pubDate>Tue, 14 Nov 2023 07:43:29 +0000</pubDate>
      <link>https://dev.to/jahinjusitn/va-pm-4716</link>
      <guid>https://dev.to/jahinjusitn/va-pm-4716</guid>
      <description>&lt;p&gt;Day 1&lt;/p&gt;

&lt;p&gt;Threat actor - Intruder&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Cyber Terrorists (Red team)&lt;/li&gt;
&lt;li&gt;Govt sponsored (Blue)&lt;/li&gt;
&lt;li&gt;Cyber Criminals (RT)&lt;/li&gt;
&lt;li&gt;Hacktivists (Gray)
5, Script Kiddies&lt;/li&gt;
&lt;li&gt;Insiders ()&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Vulnerabilities:&lt;br&gt;
1.Configuration - &lt;br&gt;
2.Credential - &lt;br&gt;
3.Patch - Using out of date software (Outdated components)&lt;br&gt;
4.Zero - day - Log4j &amp;amp; Follina&lt;/p&gt;

&lt;p&gt;Lockhead Martin Cyber kill chain &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Reconnaissance&lt;/li&gt;
&lt;li&gt;Weaponization ---- Stealing Codes &lt;/li&gt;
&lt;li&gt;Delivery&lt;/li&gt;
&lt;li&gt;Exploitation&lt;/li&gt;
&lt;li&gt;Installation &lt;/li&gt;
&lt;li&gt;Command and Control&lt;/li&gt;
&lt;li&gt;Actions on Intent - Wanna cry&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The WannaCry Kill chain Breaker&lt;/p&gt;

&lt;p&gt;Eternal Blue - Vulnerability in microsoft duwe to the SMB version 1.0. &lt;/p&gt;

&lt;p&gt;Session 2&lt;/p&gt;

&lt;p&gt;Vulnerability: is an weakness in a product that could allow an attacker to compromise the integrity, availability or confidentiality of an product&lt;/p&gt;

&lt;p&gt;CIA Triad:&lt;br&gt;
Integrity - data has not modified&lt;br&gt;
Availability - Backup and accessibility of data&lt;br&gt;
Confidentiality - keeping the data secured&lt;/p&gt;

&lt;p&gt;Non-security patch: is an software update aimed at improving the product's functionality, resolving non-security related issues by introducing new features or optimization&lt;/p&gt;

&lt;p&gt;Security patch: Is a software update designed to rectify vulnerabilities and enhance security by addressing weakness in a product and safeguarding the CIA Triad&lt;/p&gt;

&lt;p&gt;Common vulnerabilities and Exposures (CVE) - &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Independently fixable - Can be fixed independently
2.. Vendor awknowledged -&lt;/li&gt;
&lt;li&gt;Affects one code base&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Common Vulnerability Scoring System (CVSS) -&lt;/p&gt;

&lt;p&gt;CVE and CVSS are used internationally &lt;/p&gt;

&lt;p&gt;Log4j - affects applications working on java&lt;br&gt;
CVE-2021-44228&lt;br&gt;
CVSS 10.0&lt;/p&gt;

&lt;p&gt;Configuration Vuln: Is an unsafe set of configuration in an product that could allow an attacker to compromise CIA triad&lt;/p&gt;

&lt;p&gt;BlueKeep: Windows Remote Desktop Protocol - worm-able&lt;br&gt;
CVE -2019-0708&lt;br&gt;
CVSS 9.8&lt;/p&gt;

&lt;p&gt;Vuln Lifecycle&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Discovery - (Penetration Testers) - finding the Vuln&lt;/li&gt;
&lt;li&gt;Mitigation - () - reducing the risk &lt;/li&gt;
&lt;li&gt;Remediation - () - trying to resolve them &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Petya - wannacry &lt;/p&gt;

&lt;p&gt;Drive - by - attacks == bad rabbit&lt;/p&gt;

&lt;p&gt;Session 3 - intelligent endpoint patching&lt;/p&gt;

&lt;p&gt;intelligent endpoint -- An endpoint that is capable of safely self performing IT management tasks without direct administrator intervention or supervision. &lt;/p&gt;

&lt;p&gt;Safe Automation: &lt;br&gt;
Independent Automation:&lt;br&gt;
Timely Automation:&lt;/p&gt;

&lt;p&gt;Traditional stages of compliance&lt;/p&gt;

&lt;p&gt;Mean time to resolve &lt;br&gt;
Equation, Values, MTTR&lt;/p&gt;

&lt;p&gt;Architectural Recruitment&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Agent-ed solution&lt;/li&gt;
&lt;li&gt;Bidirectional Communication&lt;/li&gt;
&lt;li&gt;Persistent Connect ability&lt;/li&gt;
&lt;li&gt;Flexible Instructions&lt;/li&gt;
&lt;li&gt;Cross Platform Integrations&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Intelligent Endpoint Continuous Compliance:&lt;/p&gt;

&lt;p&gt;CIS bench mark&lt;/p&gt;

&lt;p&gt;Session 4 - Regulation and Compliance&lt;/p&gt;

&lt;p&gt;ISO 27001 - GDPR - universal standards&lt;br&gt;
IT ACT - DPDP - Indian Standards&lt;/p&gt;

&lt;p&gt;Regulatory controls&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Defining requirements&lt;/li&gt;
&lt;li&gt;Implementing controls&lt;/li&gt;
&lt;li&gt;Monitoring Compliance&lt;/li&gt;
&lt;li&gt;Reporting &lt;/li&gt;
&lt;li&gt;Continuous Improvement&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Risk Management&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  attack surface mangement
&lt;/h1&gt;

&lt;p&gt;//Equifax Breach - 2017 &lt;br&gt;
Risk Transference&lt;br&gt;
Risk mitigation&lt;br&gt;
Risk Acceptance&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Insecure Design</title>
      <dc:creator>Jahin Justin</dc:creator>
      <pubDate>Sun, 12 Nov 2023 05:45:42 +0000</pubDate>
      <link>https://dev.to/jahinjusitn/insecure-design-3d0k</link>
      <guid>https://dev.to/jahinjusitn/insecure-design-3d0k</guid>
      <description>&lt;p&gt;When designing applications, developers are recommended to use secure design patterns, diligently planned threat modeling, and reference architectures that keep the application free of security gaps.&lt;/p&gt;

&lt;p&gt;Lack of effective security controls in the design phase often results in an application being susceptible to many weaknesses, collectively known as insecure design vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is insecure design?
&lt;/h2&gt;

&lt;p&gt;Insecure design typically refers to the development of systems, products, or applications that have vulnerabilities or weaknesses that can be exploited by attackers. It can encompass a range of issues related to the design phase of a project, where decisions about architecture, functionality, and security features are made. Insecure design can lead to various security risks and threats.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fUV6b8WU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/65p3kkpcg2qas9rwwhxu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fUV6b8WU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/65p3kkpcg2qas9rwwhxu.png" alt="Image description" width="722" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Threats in Insecure design
&lt;/h2&gt;

&lt;p&gt;When developers, QA, and/or security teams neglect to foresee and assess risks in the code design stage, insecure design flaws result. These vulnerabilities also result from application designers failing to follow security best practices. Consistent threat modeling is necessary to mitigate design vulnerabilities as the threat landscape changes and to stop known attack techniques. Architectural defects like this are hard to find and fix without a secure design.&lt;/p&gt;

&lt;p&gt;Threats in Insecure Design:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Unauthorized Access:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weak authentication&lt;/li&gt;
&lt;li&gt;Inadequate authorization&lt;/li&gt;
&lt;li&gt;Absence of multi-factor authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Injection Attacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Poor input validation&lt;/li&gt;
&lt;li&gt;Lack of parameterized queries&lt;/li&gt;
&lt;li&gt;Vulnerability to SQL injection, XSS, and command injection&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Data Breaches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Insufficient data protection&lt;/li&gt;
&lt;li&gt;Weak or no encryption&lt;/li&gt;
&lt;li&gt;Storage of sensitive data in plaintext&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Denial of Service (DoS) Attacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lack of proper rate limiting&lt;/li&gt;
&lt;li&gt;Resource exhaustion vulnerabilities&lt;/li&gt;
&lt;li&gt;Failure to handle unexpected traffic spikes&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Insecure Direct Object References (IDOR):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Poorly implemented access controls&lt;/li&gt;
&lt;li&gt;Manipulation of references to gain unauthorized access&lt;/li&gt;
&lt;li&gt;Accessing or modifying data through URL or form field manipulation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Man-in-the-Middle (MITM) Attacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Insecure communication channels&lt;/li&gt;
&lt;li&gt;Lack of encryption or weak encryption protocols&lt;/li&gt;
&lt;li&gt;Unauthenticated connections vulnerable to interception&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security Misconfigurations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improperly configured systems or applications&lt;/li&gt;
&lt;li&gt;Default credentials&lt;/li&gt;
&lt;li&gt;Unnecessary services running&lt;/li&gt;
&lt;li&gt;Excessive permissions or misconfigured security settings&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security Bypass:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Circumventing authentication mechanisms&lt;/li&gt;
&lt;li&gt;Exploiting design flaws in access controls&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Elevation of Privilege:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Exploiting design flaws to escalate privileges&lt;/li&gt;
&lt;li&gt;Gaining unauthorized access to higher levels of control&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  How to Prevent Insecure Design Vulnerabilities?
&lt;/h2&gt;

&lt;p&gt;Teams of developers should use proven design patterns and factual design approaches in the application design process. To lower the application security risk associated with their workload, each team member should have access to threat models, tested component libraries, and security tools. It is recommended that security teams be involved from the outset of the development process and kept informed during the phases of development, integration, and deployment.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Establish Continuous Unit and Integration Tests&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enforce Granular Requirements and Resource Management&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Implement System and Network Layer Tier Segregation&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Impacts of Insecure Design
&lt;/h2&gt;

&lt;p&gt;Consequences of attacks on insecure design vulnerabilities vary depending on the scope of the attack, the data exposed, and the duration it continues till detection. Potential impacts of a successful exploit include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;User and system enumeration&lt;/li&gt;
&lt;li&gt;Complete account takeover&lt;/li&gt;
&lt;li&gt;System and data breaches&lt;/li&gt;
&lt;li&gt;Denial of service by spoofing a server with multiple requests&lt;/li&gt;
&lt;li&gt;Privilege escalation for compromised, low-privilege accounts&lt;/li&gt;
&lt;li&gt;The execution of other attacks such as cross-site scripting, cross-site request forgery, and path transversal&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Examples of Insecure Design Vulnerabilities
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Verbose Error Message Leading to Path Transversal&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Injection As a Trust Boundary Violation Vulnerability&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Happy Hacking
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Happy learning
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>Introduction to Pathology</title>
      <dc:creator>Jahin Justin</dc:creator>
      <pubDate>Thu, 02 Nov 2023 19:12:34 +0000</pubDate>
      <link>https://dev.to/jahinjusitn/introduction-to-pathology-3n80</link>
      <guid>https://dev.to/jahinjusitn/introduction-to-pathology-3n80</guid>
      <description>&lt;p&gt;DEFINITION OF PATHOLOGY&lt;br&gt;
The word ‘Pathology’ is derived from two Greek words—pathos&lt;br&gt;
meaning suffering, and logos meaning study. Pathology is, thus,&lt;br&gt;
scientific study of structure and function of the body in disease;&lt;br&gt;
or in other words, pathology consists of the abnormalities that&lt;br&gt;
occur in normal anatomy (including histology) and physiology&lt;br&gt;
owing to disease. Another commonly used term with reference&lt;br&gt;
to study of diseases is ‘pathophysiology’ comprised by two words:&lt;br&gt;
patho=suffering; physiology=study of normal function.&lt;br&gt;
Pathophysiology, thus, includes study of disordered function&lt;br&gt;
or breakdown of homeostasis in diseases. Pathologists are the&lt;br&gt;
diagnosticians of disease. Therefore, knowledge and&lt;br&gt;
understanding of pathology is essential for all would-be doctors,&lt;br&gt;
general medical practitioners and specialists since unless they&lt;br&gt;
know the causes, mechanisms, nature and type of disease, and&lt;br&gt;
understand the language spoken by the pathologist in the form&lt;br&gt;
of laboratory reports, they would not be able to institute&lt;br&gt;
appropriate treatment or suggest preventive measures to the&lt;br&gt;
patient. For the student of any system of medicine, the discipline&lt;br&gt;
of pathology forms a vital bridge between initial learning phase&lt;br&gt;
of preclinical sciences and the final phase of clinical subjects.&lt;br&gt;
Remember the prophetic words of one of the eminent founders&lt;br&gt;
of modern medicine in late 19th and early 20th century, Sir&lt;br&gt;
William Osler, “Your practice of medicine will be as good as&lt;br&gt;
your understanding of pathology.”&lt;/p&gt;

&lt;p&gt;HEALTH AND DISEASE&lt;br&gt;
Before there were humans on earth, there was disease, albeit in&lt;br&gt;
early animals. Since pathology is the study of disease, then what&lt;br&gt;
is disease? In simple language, disease is opposite of health i.e.&lt;br&gt;
what is not healthy is disease. Health may be defined as a&lt;br&gt;
condition when the individual is in complete accord with the&lt;br&gt;
surroundings, while disease is loss of ease (or comfort) to the&lt;br&gt;
body (i.e. dis-ease). However, it must be borne in mind that in&lt;br&gt;
health there is a wide range of ‘normality’ e.g. in height, weight,&lt;br&gt;
blood and tissue chemical composition etc. It also needs to be&lt;br&gt;
appreciated that at cellular level, the cells display wide range&lt;br&gt;
of activities within the broad area of health similar to what is&lt;br&gt;
seen in diseased cells. Thus, health and disease are not absolute&lt;br&gt;
but are considered as relative states.&lt;br&gt;
A term commonly confused with disease is illness. While&lt;br&gt;
disease suggests an entity with a cause, illness is the reaction&lt;br&gt;
of the individual to disease in the form of symptoms&lt;br&gt;
(complaints of the patient) and physical signs (elicited by&lt;br&gt;
the clinician). Though disease and illness are not separable,&lt;br&gt;
the study of diseases is done in pathology while the learning&lt;br&gt;
and management of illnesses is done in wards and clinics.&lt;br&gt;
In addition to disease and illness, there are syndromes&lt;br&gt;
(meaning running together) characterised by combination&lt;br&gt;
of symptoms caused by altered physiologic processes.&lt;/p&gt;

&lt;p&gt;TERMINOLOGY IN PATHOLOGY&lt;br&gt;
It is important for a beginner in pathology to be familiar&lt;br&gt;
with the language used in pathology:&lt;br&gt;
Patient is the person affected by disease.&lt;br&gt;
Lesions are the characteristic changes in tissues and cells&lt;br&gt;
produced by disease in an individual or experimental&lt;br&gt;
animal.&lt;br&gt;
Pathologic changes or morphology consist of examination&lt;br&gt;
of diseased tissues.&lt;br&gt;
Pathologic changes can be recognised with the naked&lt;br&gt;
eye (gross or macroscopic changes) or studied by microscopic&lt;br&gt;
examination of tissues.&lt;br&gt;
Causal factors responsible for the lesions are included&lt;br&gt;
in etiology of disease (i.e. ‘why’ of disease).&lt;br&gt;
Mechanism by which the lesions are produced is termed&lt;br&gt;
pathogenesis of disease (i.e. ‘how’ of disease).&lt;br&gt;
Functional implications of the lesion felt by the patient&lt;br&gt;
are symptoms and those discovered by the clinician are the&lt;br&gt;
physical signs.&lt;br&gt;
Clinical significance of the morphologic and functional&lt;br&gt;
changes together with results of other investigations help&lt;br&gt;
to arrive at an answer to what is wrong (diagnosis), what is&lt;br&gt;
going to happen (prognosis), what can be done about it&lt;br&gt;
(treatment), and finally what should be done to avoid&lt;br&gt;
complications and spread (prevention) (i.e. ‘what’ of disease).&lt;/p&gt;

&lt;p&gt;EVOLUTION OF PATHOLOGY&lt;br&gt;
Pathology as the scientific study of disease processes has&lt;br&gt;
its deep roots in medical history. Since the beginning of&lt;br&gt;
mankind, there has been desire as well as need to know more&lt;br&gt;
about the causes, mechanisms and nature of diseases. The&lt;br&gt;
answers to these questions have evolved over the centuries—&lt;br&gt;
from supernatural beliefs to the present state of our&lt;br&gt;
knowledge of modern pathology. However, pathology is not&lt;br&gt;
separable from other multiple disciplines of medicine and&lt;br&gt;
owes its development to interaction and interdependence on&lt;br&gt;
advances in diverse neighbouring branches of science, in&lt;br&gt;
addition to the strides made in medical technology. As we&lt;br&gt;
shall see in the pages that follow, pathology has evolved over&lt;br&gt;
the years as a distinct discipline from anatomy, medicine and&lt;br&gt;
surgery, in that sequence.&lt;br&gt;
The brief review of fascinating history of pathology and&lt;br&gt;
its many magnificent personalities with their outstanding&lt;br&gt;
contribution in the opening pages of the book is meant to pay&lt;br&gt;
our obeisance to those great personalities who have laid&lt;br&gt;
glorious foundations of our speciality. Life and works of those&lt;br&gt;
whose names are mentioned below are linked to some disease&lt;br&gt;
or process—the aim being to stimulate the inquisitive beginner&lt;br&gt;
in pathology as to how this colourful specialty has emerged.&lt;/p&gt;

&lt;p&gt;Present-day knowledge of primitive culture prevalent in the&lt;br&gt;
world in prehistoric times reveals that religion, magic and&lt;br&gt;
medical treatment were quite linked to each other in those&lt;br&gt;
times. The earliest concept of disease understood by the&lt;br&gt;
patient and the healer was the religious belief that disease&lt;br&gt;
was the outcome of ‘curse from God’ or the belief in magic&lt;br&gt;
that the affliction had supernatural origin from ‘evil eye of&lt;br&gt;
spirits.’ To ward them off, priests through prayers and&lt;br&gt;
sacrifices, and magicians by magic power used to act as faithhealers and invoke supernatural powers and please the gods.&lt;br&gt;
Remnants of ancient superstitions still exist in some parts of&lt;br&gt;
the world. The link between medicine and religion became&lt;br&gt;
so firmly established throughout the world that different&lt;br&gt;
societies had their gods and goddesses of healing; for example:&lt;br&gt;
mythological Greeks had Asclepios and Apollo as the principal&lt;br&gt;
gods of healing, Dhanvantri as the deity of medicine in India,&lt;br&gt;
and orthodox Indians’ belief in Mata Sheetala Devi as the pox&lt;br&gt;
goddess.&lt;br&gt;
The period of ancient religious and magical beliefs was&lt;br&gt;
followed by the philosophical and rational approach to disease&lt;br&gt;
by the methods of observations. This happened at the time&lt;br&gt;
when great Greek philosophers—Socrates, Plato and Aristotle,&lt;br&gt;
introduced philosophical concepts to all natural phenomena.&lt;br&gt;
But the real practice of medicine began with Hippocrates&lt;br&gt;
(460–370 BC), the great Greek clinical genius of all times and&lt;br&gt;
regarded as ‘the father of medicine’ (Fig. 1.1). Hippocrates&lt;br&gt;
followed rational and ethical attitudes in practice and teaching&lt;br&gt;
of medicine as expressed in the collection of writings of that&lt;br&gt;
era. He firmly believed in study of patient’s symptoms and&lt;br&gt;
described methods of diagnosis. The prevailing concept of&lt;br&gt;
mechanism of disease based on disequilibrium of four basic&lt;br&gt;
humors (water, air, fire, and earth) was propagated by&lt;br&gt;
Hippocates too. He recorded his observations on cases in&lt;br&gt;
writing which remained the mainstay of medicine for nearly&lt;br&gt;
two thousand years (Hippocratic aphorism). Some of the&lt;br&gt;
major Hippocratic methods can be summarised as under:&lt;br&gt;
Observe all objectively.&lt;br&gt;
Study the patient rather than the disease.&lt;br&gt;
Evaluate honestly.&lt;br&gt;
Assist nature.&lt;br&gt;
Hippocrates introduced ethical concepts in the practice&lt;br&gt;
of medicine and is revered by the medical profession by taking&lt;br&gt;
‘Hippocratic oath’ at the time of entry into practice of medicine.&lt;br&gt;
Greek medicine after Hippocrates reached Rome (now&lt;br&gt;
Italy), which controlled Greek world after 146 BC and therefore&lt;br&gt;
dominated the field of development of medicine in ancient&lt;br&gt;
Europe then. In fact, since ancient times, many tonguetwisting terminologies in medicine have their origin from&lt;br&gt;
Latin language which was the official language of countries&lt;br&gt;
included in ancient Roman empire (Spanish, Portugese,&lt;br&gt;
Italian, French and Greek languages have their origin from&lt;br&gt;
Latin).&lt;br&gt;
Hippocratic teaching was propagated in Rome by Roman&lt;br&gt;
physicians, notably by Cornelius Celsus (53 BC-7 AD) and&lt;br&gt;
Cladius Galen (130–200 AD). Celsus first described four cardinal&lt;br&gt;
signs of inflammation—rubor (redness), tumor (swelling),&lt;br&gt;
calor (heat), and dolor (pain). Galen postulated humoral&lt;br&gt;
theory, later called Galenic theory. This theory suggested that&lt;br&gt;
the illness resulted from imbalance between four humors (or&lt;br&gt;
body fluids): blood, lymph, black bile (believed to be from&lt;br&gt;
the spleen), and biliary secretion from the liver.&lt;br&gt;
The hypothesis of disequilibrium of four elements constituting the body (Dhatus) similar to Hippocratic doctrine finds&lt;br&gt;
mention in ancient Indian medicine books compiled about&lt;br&gt;
200 AD—Charaka Samhita, a finest document by Charaka on&lt;br&gt;
Figure 1.1 Hippocrates (460-370 BC). The great Greek clinical&lt;br&gt;
genius and regarded as ‘the father of medicine’. He introduced ethical&lt;br&gt;
aspects to medicine&lt;br&gt;
medicine listing 500 remedies, and Sushruta Samhita, similar&lt;br&gt;
book of surgical sciences by Sushruta, and includes about 700&lt;br&gt;
plant-derived medicines.&lt;br&gt;
The end of Medieval period was marked by backward&lt;br&gt;
steps in medicine. There were widespread and devastating&lt;br&gt;
epidemics which reversed the process of rational thinking&lt;br&gt;
again to supernatural concepts and divine punishment for&lt;br&gt;
‘sins.’ The dominant belief during this period was that life&lt;br&gt;
was due to influence of vital substance under the control of&lt;br&gt;
soul (theory of vitalism). Thus, dissection of human body was&lt;br&gt;
strictly forbidden as that would mean hurting the ‘soul.’&lt;br&gt;
FROM HUMAN ANATOMY TO ERA OF&lt;br&gt;
GROSS PATHOLOGY (AD 1500 to 1800)&lt;br&gt;
The backwardness of Medieval period was followed by the&lt;br&gt;
Renaissance period i.e. revival of leaning. The Renaissance&lt;br&gt;
began from Italy in late 15th century and spread to whole of&lt;br&gt;
Europe. During this period, there was quest for advances in&lt;br&gt;
art and science. Since there was freedom of thought, there&lt;br&gt;
was emphasis on philosophical and rational attitudes again.&lt;br&gt;
The beginning of the development of human anatomy&lt;br&gt;
took place during this period with the art works and drawings&lt;br&gt;
of human muscles and embryos by famous Italian painter&lt;br&gt;
Leonardo da Vinci (1452–1519). Dissection of human body was&lt;br&gt;
started by Vesalius (1514–1564) on executed criminals. His&lt;br&gt;
pupils, Gabriel Fallopius (1523–1562) who described human&lt;br&gt;
oviducts (Fallopian tubes) and Fabricius who discovered&lt;br&gt;
lymphoid tissue around the intestine of birds (bursa of&lt;br&gt;
Fabricius) further popularised the practice of human anatomic&lt;br&gt;
dissection for which special postmortem amphitheatres came&lt;br&gt;
in to existence in various parts of ancient Europe (Fig. 1.2).&lt;br&gt;
Antony van Leeuwenhoek (1632–1723), a cloth merchant by&lt;br&gt;
profession in Holland, during his spare time invented the first&lt;br&gt;
ever microscope by grinding the lenses himself through which&lt;br&gt;
he recognised male spermatozoa as tiny preformed men (or&lt;br&gt;
“homunculi”) and blood corpuscles. He also introduced&lt;br&gt;
histological staining in 1714 using saffron to examine muscle&lt;br&gt;
fibres.&lt;br&gt;
Marcello Malpighi (1624–1694) used microscope extensively&lt;br&gt;
and observed the presence of capillaries and described the&lt;br&gt;
malpighian layer of the skin, and lymphoid tissue in the spleen&lt;br&gt;
(malpighian corpuscles). Malpighi is known as ‘the father of&lt;br&gt;
histology.’&lt;br&gt;
The credit for beginning of the study of morbid anatomy&lt;br&gt;
(pathologic anatomy), however, goes to Italian anatomistpathologist, Giovanni B. Morgagni (1682–1771). Morgagni was&lt;br&gt;
an excellent teacher in anatomy, a prolific writer and a&lt;br&gt;
practicing clinician. By his work, Morgagni demolished the&lt;br&gt;
ancient humoral theory of disease and published his life-time&lt;br&gt;
experiences based on 700 postmortems and their&lt;br&gt;
corresponding clinical findings. He, thus, laid the foundations&lt;br&gt;
of clinicopathologic methodology in the study of disease and&lt;br&gt;
introduced the concept of clinicopathologic correlation (CPC),&lt;br&gt;
establishing a coherent sequence of cause, lesions, symptoms,&lt;br&gt;
and outcome of disease (Fig. 1.3).&lt;br&gt;
Sir Percival Pott (1714–1788), famous surgeon in England,&lt;br&gt;
identified the first ever occupational cancer in the chimney&lt;br&gt;
sweeps in 1775 and discovered chimney soot as the first&lt;br&gt;
carcinogenic agent. However, the study of anatomy in&lt;br&gt;
England during the latter part of 18th Century was&lt;br&gt;
dominated by the two Hunter brothers: John Hunter (1728–&lt;br&gt;
1793), a student of Sir Percival Pott, rose to become greatest&lt;br&gt;
surgeon-anatomist of all times and he, together with his elder&lt;br&gt;
brother William Hunter (1718–1788) who was a reputed&lt;br&gt;
anatomist-obstetrician (or man-midwife), started the first&lt;br&gt;
ever museum of pathologic anatomy. John Hunter made a&lt;br&gt;
collection of more than 13,000 surgical specimens from his&lt;br&gt;
flourishing practice, arranged them into separate organ&lt;br&gt;
systems, made comparison of specimens from animals and&lt;br&gt;
plants with humans, and included many clinical pathology&lt;br&gt;
specimens as well, and thus developed the first museum of&lt;br&gt;
comparative anatomy and pathology in the world which&lt;br&gt;
became the Hunterian Museum, now housed in Royal&lt;br&gt;
College of Surgeons of London (Fig. 1.4). Amongst many&lt;br&gt;
pupils of John Hunter was Edward Jenner (1749–1823) whose&lt;br&gt;
work on inoculation in smallpox is well known. Another&lt;br&gt;
prominent English pathologist was Matthew Baillie (1760–&lt;br&gt;
1823), nephew of Hunter brothers, who published first-ever&lt;br&gt;
systematic textbook of morbid anatomy in 1793. The era of&lt;br&gt;
gross pathology had three more illustrious and brilliant&lt;br&gt;
physician-pathologists in England who were colleagues at&lt;br&gt;
Guy’s Hospital in London:&lt;br&gt;
Richard Bright (1789–1858) who described nonsuppurative nephritis, later termed glomerulonephritis or&lt;br&gt;
Bright’s disease;&lt;br&gt;
Thomas Addison (1793–1860) who gave an account of&lt;br&gt;
chronic adrenocortical insufficiency termed Addison’s&lt;br&gt;
disease; and&lt;br&gt;
Thomas Hodgkin (1798–1866), who observed the complex&lt;br&gt;
of chronic enlargement of lymph nodes, often with&lt;br&gt;
enlargement of the liver and spleen, later called Hodgkin’s&lt;br&gt;
disease.&lt;br&gt;
Towards the end of 18th century, Xavier Bichat&lt;br&gt;
(1771–1802) in France described that organs were composed&lt;br&gt;
of tissue and divided the study of morbid anatomy into&lt;br&gt;
General Pathology and Systemic Pathology. R.T.H. Laennec&lt;br&gt;
(1781–1826), another French physician, dominated the early&lt;br&gt;
Figure 1.2 In 16th Century, postmortem amphitheatre in Europe&lt;br&gt;
was a place of learning human anatomic dissection conducted and&lt;br&gt;
demonstrated by professors to eager learners and spectators.&lt;/p&gt;

&lt;p&gt;part of 19th century by his numerous discoveries. He&lt;br&gt;
described several lung diseases (tubercles, caseous lesions,&lt;br&gt;
miliary lesions, pleural effusion, bronchiectasis), chronic&lt;br&gt;
sclerotic liver disease (later called Laennec’s cirrhosis) and&lt;br&gt;
invented stethoscope.&lt;br&gt;
Morbid anatomy attained its zenith with appearance of&lt;br&gt;
Carl F. von Rokitansky (1804–1878), self-taught German&lt;br&gt;
pathologist who performed nearly 30,000 autopsies himself.&lt;br&gt;
He described acute yellow atrophy of the liver, wrote an&lt;br&gt;
outstanding monograph on diseases of arteries and&lt;br&gt;
congenital heart defects. Unlike most other surgeons of that&lt;br&gt;
time, Rokitansky did not do clinical practice of surgery but&lt;br&gt;
instead introduced the concept that pathologists should&lt;br&gt;
confine themselves to making diagnosis which became the&lt;br&gt;
accepted role of pathologist later.&lt;br&gt;
ERA OF TECHNOLOGY DEVELOPMENT AND&lt;br&gt;
CELLULAR PATHOLOGY (AD 1800 TO 1950s)&lt;br&gt;
Up to middle of the 19th century, correlation of clinical&lt;br&gt;
manifestations of disease with gross pathological findings&lt;br&gt;
at autopsy became the major method of study of disease.&lt;br&gt;
Sophistication in surgery led to advancement in pathology.&lt;br&gt;
The anatomist-surgeons of earlier centuries got replaced&lt;br&gt;
largely with surgeon-pathologists in the 19th century.&lt;br&gt;
Pathology started developing as a diagnostic discipline&lt;br&gt;
in later half of the 19th century with the evolution of cellular&lt;br&gt;
pathology which was closely linked to technology&lt;br&gt;
advancements in machinery manufacture for cutting thin&lt;br&gt;
sections of tissue, improvement in microscope, and&lt;br&gt;
development of chemical industry and dyes for staining.&lt;br&gt;
The discovery of existence of disease-causing microorganisms was made by French chemist Louis Pasteur&lt;br&gt;
(1822–1895), thus demolishing the prevailing theory of&lt;br&gt;
spontaneous generation of disease and firmly established&lt;br&gt;
germ theory of disease. Subsequently, G.H.A. Hansen&lt;br&gt;
(1841–1912) in Germany identified Hansen’s bacillus as&lt;br&gt;
causative agent for leprosy (Hansen’s disease) in 1873. While&lt;br&gt;
the study of infectious diseases was being made, the concept&lt;br&gt;
of immune tolerance and allergy emerged which formed the&lt;br&gt;
basis of immunisation initiated by Edward Jenner. Ilya&lt;br&gt;
Metchnikoff (1845-1916), a Russian zoologist, introduced the&lt;br&gt;
existence of phenomenon of phagocytosis by human defense&lt;br&gt;
cells against invading microbes.&lt;br&gt;
Developments in chemical industry helped in switch over&lt;br&gt;
from earlier dyes of plant and animal origin to synthetic dyes;&lt;br&gt;
aniline violet being the first such synthetic dye prepared by&lt;br&gt;
Perkin in 1856. This led to emergence of a viable dye industry&lt;br&gt;
for histological and bacteriological purposes. \&lt;br&gt;
Robert Feulgen (1884–1955) who described Feulgen reaction&lt;br&gt;
for DNA staining and laid the foundations of cytochemistry and&lt;br&gt;
histochemistry.&lt;br&gt;
Simultaneous technological advances in machinery&lt;br&gt;
manufacture led to development and upgradation of&lt;br&gt;
microtomes for obtaining thin sections of organs and tissues&lt;br&gt;
for staining by dyes for enhancing detailed study of sections.&lt;br&gt;
Though the presence of cells in thin sections of non-living&lt;br&gt;
object cork had been first demonstrated much earlier by Robert&lt;br&gt;
Hooke in 1667, it was revived as a unit of living matter in the&lt;br&gt;
19th century by F.T. Schwann (1810–1882), the first&lt;br&gt;
neurohistologist, and Claude Bernarde (1813–1878), pioneer in&lt;br&gt;
pathophysiology.&lt;br&gt;
Until the end of the 19th century, the study of morbid&lt;br&gt;
anatomy had remained largely autopsy-based and thus had&lt;br&gt;
remained a retrospective science. Rudolf Virchow (1821–1905) in&lt;br&gt;
Germany is credited with the beginning of microscopic&lt;br&gt;
examination of diseased tissue at cellular level and thus began&lt;br&gt;
histopathology as a method of investigation. Virchow gave two&lt;br&gt;
major hypotheses:&lt;br&gt;
All cells come from other cells.&lt;br&gt;
Disease is an alteration of normal structure and function of&lt;br&gt;
these cells.&lt;br&gt;
Virchow came to be referred as Pope in pathology in Europe&lt;br&gt;
and is aptly known as the ‘father of cellular pathology’&lt;br&gt;
(Fig. 1.6). Thus, sound foundation of diagnostic pathology had&lt;br&gt;
been laid which was followed and promoted by numerous&lt;br&gt;
brilliant successive workers. Thus, knowledge and skill gained&lt;br&gt;
by giving accurate diagnosis on postmortem findings started&lt;br&gt;
being applied to surgical biopsy and thus emerged the discipline&lt;br&gt;
of surgical pathology. Virchow also described etiology of&lt;br&gt;
embolism (Virchow’s triad—slowing of blood-stream, changes&lt;br&gt;
in the vessel wall, changes in the blood itself), metastatic spread&lt;br&gt;
of tumours (Virchow’s lymph node), and components and&lt;br&gt;
diseases of blood (fibrinogen, leukocytosis, leukaemia).&lt;br&gt;
The concept of frozen section examination when the&lt;br&gt;
patient was still on the operation table was introduced by&lt;br&gt;
Virchow’s student, Julius Cohnheim (1839–1884). In fact,&lt;br&gt;
during the initial period of development of surgical&lt;br&gt;
pathology around the turn of the 19th century, frozen&lt;br&gt;
section was considered more acceptable by the surgeons.&lt;br&gt;
Then there was the period when morphologic examination&lt;br&gt;
of cells by touch imprint smears was favoured for diagnostic&lt;br&gt;
purposes than actual tissue sections. Subsequently, further&lt;br&gt;
advances in surgical pathology were made possible by&lt;br&gt;
improved machinery and development of dyes and stains.&lt;br&gt;
The concept of surgeon and physician doubling up in&lt;br&gt;
the role of pathologist which started in the 19th century&lt;br&gt;
continued as late as the middle of the 20th century in most&lt;br&gt;
clinical departments. Assigning biopsy pathology work to&lt;br&gt;
some faculty member in the clinical department was&lt;br&gt;
common practice; that is why some of the notable&lt;br&gt;
pathologists of the first half of 20th century had background&lt;br&gt;
of clinical training e.g. James Ewing (1866–1943), A.P. Stout&lt;br&gt;
(1885–1967) and Lauren Ackerman (1905–1993) in US, Pierre&lt;br&gt;
Masson (1880–1958) in France, and RA Willis in Australia.&lt;br&gt;
A few other landmarks in further evolution of modern&lt;br&gt;
pathology in this era are as follows:&lt;br&gt;
Karl Landsteiner (1863–1943) described the existence of&lt;br&gt;
major human blood groups in 1900 and was awarded Nobel&lt;br&gt;
prize in 1930 and is considered father of blood transfusion&lt;br&gt;
(Fig. 1.7).&lt;br&gt;
Ruska and Lorries in 1933 developed electron microscope&lt;br&gt;
which aided the pathologist to view ultrastructure of cell&lt;br&gt;
and its organelles.&lt;br&gt;
The development of exfoliative cytology for early&lt;br&gt;
detection of cervical cancer began with George N. Papanicolaou&lt;br&gt;
(1883–1962), a Greek-born American pathologist, in 1930s&lt;br&gt;
who is known as ‘father of exfoliative cytology’ (Fig. 1.8).&lt;br&gt;
Figure 1.6 Rudolf Virchow (1821-1905).&lt;br&gt;
German pathologist who proposed cellular&lt;br&gt;
theory of disease.&lt;br&gt;
Figure 1.7 Carl Landsteiner (1863-1943).&lt;br&gt;
An Austrian pathologist who first discovered the&lt;br&gt;
existence of major human blood groups in 1900&lt;br&gt;
and was recipient of Nobel prize in 1930.&lt;br&gt;
Figure 1.8 George N. Papanicolaou&lt;br&gt;
(1883-1962). American pathologist, who&lt;br&gt;
developed Pap test for diagnosis of cancer of&lt;br&gt;
uterine cervix.&lt;br&gt;
FATHER OF CELLULAR PATHOLOGY FATHER OF BLOOD TRANSFUSION FATHER OF EXFOLIATIVE CYTOLOGY&lt;/p&gt;

&lt;p&gt;Another pioneering contribution in pathology in the&lt;br&gt;
20th century was by an eminent teacher-author, William&lt;br&gt;
Boyd (1885–1979), psychiatrist-turned pathologist, whose&lt;br&gt;
textbooks—‘Pathology for Surgeons’ (first edition 1925) and&lt;br&gt;
‘Textbook of Pathology’ (first edition 1932), dominated and&lt;br&gt;
inspired the students of pathology all over the world due&lt;br&gt;
to his flowery language and lucid style for about 50 years&lt;br&gt;
till 1970s (Fig. 1.9). M.M. Wintrobe (1901–1986), a pupil of&lt;br&gt;
Boyd who discovered haematocrit technique, regarded him&lt;br&gt;
as a very stimulating teacher with keen interest in the&lt;br&gt;
development of museum.&lt;br&gt;
MODERN PATHOLOGY (1950s TO PRESENT TIMES)&lt;br&gt;
The strides made in the latter half of 20th century until the&lt;br&gt;
beginning of 21st century have made it possible to study&lt;br&gt;
diseases at molecular level, and provide an evidence-based&lt;br&gt;
and objective diagnosis and enable the physician to institute&lt;br&gt;
appropriate therapy. The major impact of advances in&lt;br&gt;
molecular biology are in the field of diagnosis and treatment&lt;br&gt;
of genetic disorders, immunology and in cancer. Some of&lt;br&gt;
the revolutionary discoveries during this time are as under&lt;br&gt;
(Fig. 1.10):&lt;br&gt;
Description of the structure of DNA of the cell by Watson&lt;br&gt;
and Crick in 1953.&lt;br&gt;
Identification of chromosomes and their correct number&lt;br&gt;
in humans (46) by Tijo and Levan in 1956.&lt;br&gt;
Identification of Philadelphia chromosome t(9;22) in&lt;br&gt;
chronic myeloid leukaemia by Nowell and Hagerford in 1960&lt;br&gt;
as the first chromosomal abnormality in any cancer.&lt;br&gt;
In Situ Hybridization introduced in 1969 in which a&lt;br&gt;
labelled probe is employed to detect and localize specific&lt;br&gt;
RNA or DNA sequences ‘in situ’ (i.e. in the original place).&lt;br&gt;
Recombinant DNA technique developed in 1972 using&lt;br&gt;
restriction enzymes to cut and paste bits of DNA.&lt;br&gt;
In 1983, Kary Mullis introduced polymerase chain reaction&lt;br&gt;
(PCR) i.e. “xeroxing” DNA fragments which revolutionised&lt;br&gt;
the diagnostic molecular genetics.&lt;br&gt;
Flexibility and dynamism of DNA invented by Barbara&lt;br&gt;
McClintock for which she was awarded Nobel prize in 1983.&lt;br&gt;
Figure 1.9 William Boyd (1885-1979). Canadian pathologist and&lt;br&gt;
eminent teacher of pathology who was a pioneering author of textbooks of&lt;br&gt;
pathology which have been read all over the world by students of pathology&lt;br&gt;
and surgery for over 50 years.&lt;br&gt;
Figure 1.10 Molecular structure of human chromosome.&lt;br&gt;
In 1997, Ian Wilmut and his colleagues at Roslin Institute in&lt;br&gt;
Edinburgh, successfully used a technique of somatic cell nuclear&lt;br&gt;
transfer to create the clone of a sheep; the cloned sheep was&lt;br&gt;
named Dolly. This has set in the era of mammalian cloning.&lt;br&gt;
Reproductive cloning for human beings, however, is very risky&lt;br&gt;
besides being absolutely unethical.&lt;br&gt;
In 1998, researchers in US found a way of harvesting stem&lt;br&gt;
cells, a type of primitive cells, from embryos and maintaining&lt;br&gt;
their growth in the laboratory, and thus started the era of stem&lt;br&gt;
cell research. Stem cells are seen by many researchers as having&lt;br&gt;
virtually unlimited application in the treatment of many human&lt;/p&gt;

&lt;p&gt;diseases such as Alzheimer’s disease, diabetes, cancer, strokes,&lt;br&gt;
etc. There are 2 types of sources of stem cells: embryonic stem&lt;br&gt;
cells and adult stem cells. Since embryonic stem cells are more&lt;br&gt;
numerous, therapeutic cloning of human embryos as a source of&lt;br&gt;
stem cells for treating some incurable diseases has been allowed&lt;br&gt;
in some parts of the world. A time may come when by using&lt;br&gt;
embryonic stem cells, insulin-producing cells may be introduced&lt;br&gt;
into the pancreas in a patient of insulin-dependent diabetes&lt;br&gt;
mellitus, or stem cells may be cultured in the laboratory in lieu&lt;br&gt;
of a whole organ transplant. Thus, time is not far when organs&lt;br&gt;
for transplant may be ‘harvested’ from the embryo in lieu of a&lt;br&gt;
whole organ transplant.&lt;br&gt;
In April 2003, Human Genome Project (HGP) consisting of&lt;br&gt;
a consortium of countries, was completed which coincided with&lt;br&gt;
50 years of description of DNA double helix by Watson and&lt;br&gt;
Crick in April 1953. The sequencing of human genome reveals that&lt;br&gt;
human genome contains approximately 3 billion of the base&lt;br&gt;
pairs, which reside in the 23 pairs of chromosomes within the&lt;br&gt;
nucleus of all human cells. Each chromosome contains an&lt;br&gt;
estimated 30,000 genes in the human genome, contrary to the&lt;br&gt;
earlier estimate of about 100,000 genes, which carry the&lt;br&gt;
instructions for making proteins. The HGP gave us the ability&lt;br&gt;
to read nature’s complete genetic blueprint for building each&lt;br&gt;
human being. All this has opened new ways in treating and&lt;br&gt;
researching an endless list of diseases that are currently&lt;br&gt;
incurable. In time to come, medical scientists will be able to&lt;br&gt;
develop highly effective diagnostic tools, to better understand&lt;br&gt;
the health needs of people based on their individual genetic&lt;br&gt;
make-ups, and to design new and highly effective treatments&lt;br&gt;
for disease as well as suggest prevention against disease.&lt;br&gt;
These inventions have set in an era of human molecular&lt;br&gt;
biology which is no longer confined to research laboratories but&lt;br&gt;
is ready for application as a modern diagnostic and therapeutic&lt;br&gt;
tool. Modern day human molecular biology is closely linked to&lt;br&gt;
information technology; the best recent example is the&lt;br&gt;
availability of molecular profiling by cDNA microarrays in which&lt;br&gt;
by a small silicon chip, expression of thousands of genes can be&lt;br&gt;
simultaneously measured.&lt;br&gt;
SUBDIVISIONS OF PATHOLOGY&lt;br&gt;
After a retrospective into the historical aspects of pathology,&lt;br&gt;
and before plunging into the study of diseases in the chapters&lt;br&gt;
that follow, we first introduce ourselves with the branches of&lt;br&gt;
human pathology.&lt;br&gt;
Depending upon the species studied, there are various&lt;br&gt;
disciplines of pathology such as human pathology, animal&lt;br&gt;
pathology, plant pathology, veterinary pathology, poultry&lt;br&gt;
pathology etc. Comparative pathology deals with the study of&lt;br&gt;
diseases in animals in comparison with those found in man.&lt;br&gt;
Human pathology is the largest branch of pathology. It is&lt;br&gt;
conventionally divided into General Pathology dealing with&lt;br&gt;
general principles of disease, and Systemic Pathology that&lt;br&gt;
includes study of diseases pertaining to the specific organs and&lt;br&gt;
body systems. With the advancement of diagnostic tools, the&lt;br&gt;
broad principles of which are outlined in the next chapter, the&lt;br&gt;
speciality of pathology has come to include the following&lt;br&gt;
subspecialities:&lt;br&gt;
A. HISTOPATHOLOGY. Histopathology, used synonymously&lt;br&gt;
with anatomic pathology, pathologic anatomy, or morbid&lt;br&gt;
anatomy, is the classic method of study and still the most&lt;br&gt;
useful one which has stood the test of time. The study&lt;br&gt;
includes structural changes observed by naked eye&lt;br&gt;
examination referred to as gross or macroscopic changes,&lt;br&gt;
and the changes detected by light and electron microscopy&lt;br&gt;
supported by numerous special staining methods including&lt;br&gt;
histochemical and immunological techniques to arrive at&lt;br&gt;
the most accurate diagnosis. Modern time anatomic&lt;br&gt;
pathology includes super-specialities such as cardiac&lt;br&gt;
pathology, pulmonary pathology, neuropathology, renal&lt;br&gt;
pathology, gynaecologic pathology, breast pathology,&lt;br&gt;
dermatopathology, gastrointestinal pathology, oral&lt;br&gt;
pathology, and so on. Anatomic pathology includes the&lt;br&gt;
following 3 main subdivisions:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Surgical pathology. It deals with the study of tissues
removed from the living body. It forms the bulk of tissue
material for the pathologist and includes study of tissue by
paraffin embedding techniques and by frozen section for rapid
diagnosis.&lt;/li&gt;
&lt;li&gt;Forensic pathology and autopsy work. This includes
the study of organs and tissues removed at postmortem
for medicolegal work and for determining the underlying
sequence and cause of death. By this, the pathologist
attempts to reconstruct the course of events how they may
have happened in the patient during life which culminated
in his death. Postmortem anatomical diagnosis is helpful
to the clinician to enhance his knowledge about the disease
and his judgement while forensic autopsy is helpful for
medicolegal purposes. The significance of a careful
postmortem examination can be summed up in the old
saying ‘the dead teach the living’.&lt;/li&gt;
&lt;li&gt;Cytopathology. Though a branch of anatomic
pathology, cytopathology has developed as a distinct
subspeciality in recent times. It includes study of cells shed
off from the lesions (exfoliative cytology) and fine-needle
aspiration cytology (FNAC) of superficial and deep-seated
lesions for diagnosis (Chapter 11).
B. HAEMATOLOGY. Haematology deals with the diseases
of blood. It includes laboratory haematology and clinical
haematology; the latter covers the management of patient
as well.
C. CHEMICAL PATHOLOGY. Analysis of biochemical
constituents of blood, urine, semen, CSF and other body
fluids is included in this branch of pathology.
D. IMMUNOLOGY. Detection of abnormalities in the
immune system of the body comprises immunology and
immunopathology.
E. EXPERIMENTAL PATHOLOGY. This is defined as
production of disease in the experimental animal and its
study. However, all the findings of experimental work in
animals may not be applicable to human beings due to
species differences.
F. GEOGRAPHIC PATHOLOGY. The study of differences
in distribution of frequency and type of diseases in
populations in different parts of the world forms geographic
pathology.
8&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;G. MEDICAL GENETICS. This is the branch of human&lt;br&gt;
genetics that deals with the relationship between heredity&lt;br&gt;
and disease. There have been important developments in&lt;br&gt;
the field of medical genetics e.g. in blood groups, inborn&lt;br&gt;
errors of metabolism, chromosomal aberrations in&lt;br&gt;
congenital malformations and neoplasms etc.&lt;br&gt;
H. MOLECULAR PATHOLOGY. The detection and&lt;br&gt;
diagnosis of abnormalities at the level of DNA of the cell&lt;br&gt;
is included in molecular pathology. Recent advancements&lt;br&gt;
in molecular biologic techniques have resulted in&lt;br&gt;
availability of these methods not only for research&lt;br&gt;
purposes but also as a tool in diagnostic pathology.&lt;br&gt;
In conclusion, it is said that specialisation makes human&lt;br&gt;
minds strangers to each other. But the above divisions of&lt;br&gt;
pathology into several specialisations are quite artificial since&lt;br&gt;
pathology embraces all disciplines of medicine and thus&lt;br&gt;
overlapping of specialities is likely. While in the chapters that&lt;br&gt;
follow, efforts have been made to present the entire subject&lt;br&gt;
covering diseases of the whole human body in an integrated&lt;br&gt;
and coordinated manner, knowledge is ever-expanding on a&lt;br&gt;
daily basis and the quest for learning more an ongoing&lt;br&gt;
process. Thus, all of us remain lifelong students of the art of&lt;br&gt;
pathology of diseases!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Vulnerable and Outdated Components</title>
      <dc:creator>Jahin Justin</dc:creator>
      <pubDate>Fri, 27 Oct 2023 12:30:49 +0000</pubDate>
      <link>https://dev.to/jahinjusitn/vulnerable-and-outdated-components-2g43</link>
      <guid>https://dev.to/jahinjusitn/vulnerable-and-outdated-components-2g43</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;I'm sure you use some pre-built libraries or packages when you design applications to help with the process, don't you?&lt;/p&gt;

&lt;p&gt;Take a look at any straightforward GET request Python code. It's likely that the requests library or something compactable would be used. You could utilize Pillow to work with photos if you'd like.&lt;/p&gt;

&lt;p&gt;If you work in web development, you may be using popular libraries and frameworks like Angular, ReactJS, VueJS, the Bootstrap framework, and jQuery.&lt;/p&gt;

&lt;p&gt;Both you and your clients and application users would be impacted if the components you are using to develop your apps become out-of-date or have a significant vulnerability. &lt;/p&gt;

&lt;p&gt;Keeping track of your dependencies takes a lot of effort. It involves more work than just getting the most recent dependencies and packages or executing the update command. But it goes much beyond this: the most recent updates to your apps may cause them to malfunction; some features or functionalities may become obsolete; dependencies may be dropped; or the patch may not run on your system without interfering with other dependencies, causing chaos. &lt;/p&gt;

&lt;p&gt;Updating and ensuring that everything stays up to date may seem easy, but it takes a lot of work and isn't always that simple. Unless you're prepared to invest additional time and update your code to make it compatible with the newest and best updates, this process can be difficult.&lt;/p&gt;

&lt;p&gt;Let's talk about the number 6 vulnerability in OWASP's TOP 10 security risks i.e Vulnerable And Outdated Components&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4CDTrc4i--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zy8o41rwcdkcrode76qd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4CDTrc4i--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zy8o41rwcdkcrode76qd.jpg" alt="Image description" width="281" height="180"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Vulnerable and Outdated Components
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Vulnerable Components&lt;/strong&gt;: &lt;/p&gt;

&lt;p&gt;Vulnerable components refer to those pieces of software that contain security flaws, often referred to as "software vulnerabilities." These vulnerabilities can be exploited by malicious actors to compromise the security of your application. Common examples include code injection vulnerabilities, cross-site scripting (XSS), and SQL injection. These issues are typically discovered after a component has been released and may not be immediately visible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Outdated Components&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;Outdated components are software elements that have not been updated to their latest versions. This might occur because developers are unaware of updates, or they fear that updates could break existing functionality. Outdated components can pose a significant risk because security patches and improvements provided in newer versions are not applied, leaving your software exposed to known vulnerabilities.&lt;/p&gt;

&lt;p&gt;Vulnerabilities over such components may exist for several years before they are discovered, fixed, or disclosed. Sometimes, a vulnerability may not even be identified until it has been exploited. Some of such vulnerabilities include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Injection Vulnerabilities &lt;/li&gt;
&lt;li&gt;Buffer Overflows&lt;/li&gt;
&lt;li&gt;Cross-Site Scripting &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;*&lt;em&gt;Types of Vulnerable And Outdated Components *&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Failure to maintain components&lt;/li&gt;
&lt;li&gt;Out-of-date support systems&lt;/li&gt;
&lt;li&gt;Component Misconfiguration&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Successful attacks on vulnerable and Outdated components can result in &lt;br&gt;
Distributed Denial Of Service, Remote Code Execution attacks, and mass disclosure of records intended for private access.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rfwd-vJh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8f3a1u9r54jt32ch5ki4.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rfwd-vJh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8f3a1u9r54jt32ch5ki4.jpg" alt="Image description" width="259" height="194"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Steps to identify Vulnerable and Outdated Components
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;OWASP Scanner:&lt;/strong&gt;  This scanner tests all the software packages against the latest OWASP Top 10 vulnerabilities and their mapped CWEs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;API Vulnerability Scanner:&lt;/strong&gt; This scanner checks for safe API implementation and raises an alert if the interface includes misconfigured HTTP directives.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Command Injection Scanner:&lt;/strong&gt; Verifies inputs to see if the program is susceptible to code injection attacks, such as user-supplied URLs, message boards, and comment areas.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Microservices scanner:&lt;/strong&gt; This scanner examines all containerized services and functionality for common vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;XSS Scanner:&lt;/strong&gt; Examines program components for vectors used in cross-site scripting attacks.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;
  
  
  The Best Ways to Handle Outdated and Vulnerable Components
&lt;/h2&gt;

&lt;p&gt;The following are a few recommended techniques for handling vulnerable and Outdated components:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use automated techniques to regularly check your web applications for vulnerabilities.&lt;/li&gt;
&lt;li&gt;Make a list of all the third-party frameworks and libraries that you utilize in your web apps.&lt;/li&gt;
&lt;li&gt;Keep an eye out for security alerts from the component's creators and install updates as soon as possible.&lt;/li&gt;
&lt;li&gt;Steer clear of employing components without an active development community or ones that haven't received updates in a long time.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Online applications are significantly in danger from Vulnerable and Outdated components. Attackers may use these flaws to take over the system or obtain unauthorized access to private information. It is crucial to keep these components up to date with regular security updates or patches from their developers in order to reduce these risks. It's also imperative to use components with an active development community that are regularly maintained only. You may assist in safeguarding the security of your web apps from attacks that take advantage of obsolete and vulnerable components by adhering to certain recommended practices.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/AyD7KjOGOO4"&gt;
&lt;/iframe&gt;
&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="https://medium.com/@shivam_bathla/a06-2021-vulnerable-and-outdated-components-a5d96017049c#id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6ImEwNmFmMGI2OGEyMTE5ZDY5MmNhYzRhYmY0MTVmZjM3ODgxMzZmNjUiLCJ0eXAiOiJKV1QifQ.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.aDXCuq7O4kfxWmZrj_dJahl3BY0s2en8HUO8UjvHe0ssv8gXzs-vCWuCU04SOI3H-EDJGNYwcTw2YDoa5hhTEmgOqURe8K4pkbXvfy8d3X1KpmQWhblQfPIB-bCUlPeCFiSO28zYNraTIR4QXkWw_9K1hEL4-mEEZKYjAgHJyGrJ8w595JvX7fHr17jgyCUm40LDuDBGcoIyE-ozrJJdSqslJ6lVckpekN7jJYyeN_e0UhWjzTYIZDAKYUPK0Of-SVE6PdWM8Yk0Gf_kUn55DchbM7JgrBmtqb9HN6-7EzU8SWN-AqjBOTqev6vX5w0OcXHTzQv899JFglhGAP3G4w" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--H9ZgGb4O--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://miro.medium.com/v2/resize:fill:88:88/1%2AexffnVe5KKZ1sJlQJksn0Q.png" alt="Shivam Bathla"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://medium.com/@shivam_bathla/a06-2021-vulnerable-and-outdated-components-a5d96017049c#id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6ImEwNmFmMGI2OGEyMTE5ZDY5MmNhYzRhYmY0MTVmZjM3ODgxMzZmNjUiLCJ0eXAiOiJKV1QifQ.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.aDXCuq7O4kfxWmZrj_dJahl3BY0s2en8HUO8UjvHe0ssv8gXzs-vCWuCU04SOI3H-EDJGNYwcTw2YDoa5hhTEmgOqURe8K4pkbXvfy8d3X1KpmQWhblQfPIB-bCUlPeCFiSO28zYNraTIR4QXkWw_9K1hEL4-mEEZKYjAgHJyGrJ8w595JvX7fHr17jgyCUm40LDuDBGcoIyE-ozrJJdSqslJ6lVckpekN7jJYyeN_e0UhWjzTYIZDAKYUPK0Of-SVE6PdWM8Yk0Gf_kUn55DchbM7JgrBmtqb9HN6-7EzU8SWN-AqjBOTqev6vX5w0OcXHTzQv899JFglhGAP3G4w" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;A06:2021-Vulnerable and Outdated Components | by Shivam Bathla | Medium&lt;/h2&gt;
      &lt;h3&gt;Shivam Bathla ・ &lt;time&gt;Sep 21, 2021&lt;/time&gt; ・ 
      &lt;div class="ltag__link__servicename"&gt;
        &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YjpYcCMa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev.to/assets/medium-f709f79cf29704f9f4c2a83f950b2964e95007a3e311b77f686915c71574fef2.svg" alt="Medium Logo"&gt;
        Medium
      &lt;/div&gt;
    &lt;/h3&gt;
&lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;p&gt;Happy Hacking!&lt;/p&gt;

</description>
      <category>programming</category>
      <category>opensource</category>
      <category>vulnerabilities</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Introduction to OWASP</title>
      <dc:creator>Jahin Justin</dc:creator>
      <pubDate>Wed, 25 Oct 2023 17:23:56 +0000</pubDate>
      <link>https://dev.to/jahinjusitn/introduction-to-owasp-5j6</link>
      <guid>https://dev.to/jahinjusitn/introduction-to-owasp-5j6</guid>
      <description>&lt;p&gt;The Open Web Application Security Project (OWASP) is a nonprofit organization that focuses on improving the security of software applications. OWASP provides resources, tools, and documentation to help developers, organizations, and security professionals understand and address web application security issues.&lt;/p&gt;

&lt;p&gt;OWASP promotes a proactive approach to application security, emphasizing the importance of considering security throughout the entire software development lifecycle. The organization offers a variety of projects and initiatives, including the OWASP Top Ten, which highlights the most critical web application security risks.&lt;/p&gt;

&lt;p&gt;By following the OWASP guidelines and best practices, developers can build more secure and resilient applications, protecting both the organization and its users from potential security vulnerabilities and attacks.&lt;/p&gt;

&lt;p&gt;Overall, OWASP plays a crucial role in raising awareness about web application security and providing the necessary resources to enhance the security posture of software applications.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why does OWASP Top 10 matter?
&lt;/h2&gt;

&lt;p&gt;The OWASP Top Ten is crucial for web application security because it provides a comprehensive list of the most critical security risks that developers need to be aware of. By understanding and addressing these risks, developers can prioritize their security efforts and protect their applications from potential vulnerabilities and attacks. The OWASP Top Ten serves as a valuable guide for organizations to enhance their security posture and mitigate potential security threats. It is an essential resource that helps developers build more secure and resilient applications, ultimately protecting both the organization and its users.&lt;/p&gt;

&lt;p&gt;The OWASP Top Ten matters because it provides a comprehensive and up-to-date list of the most critical security risks in web applications. By understanding and addressing these risks, developers can prioritize their security efforts and protect their applications from potential vulnerabilities and attacks. The OWASP Top Ten serves as a valuable guide for organizations to enhance their security posture and mitigate potential security threats. It is an essential resource that helps developers build more secure and resilient applications, ultimately protecting both the organization and its users.&lt;/p&gt;

&lt;h2&gt;
  
  
  OWASP Top 10 vulnerabilities list (2021)
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Broken Access Control&lt;/li&gt;
&lt;li&gt;Cryptographic Failures &lt;/li&gt;
&lt;li&gt;Injection &lt;/li&gt;
&lt;li&gt;Insecure Design &lt;/li&gt;
&lt;li&gt;Security Misconfiguration &lt;/li&gt;
&lt;li&gt;Vulnerable and Outdated Components &lt;/li&gt;
&lt;li&gt;Identification and Authentication Failures &lt;/li&gt;
&lt;li&gt;Software and Data Integrity Failures &lt;/li&gt;
&lt;li&gt;Security Logging and Monitoring Failures &lt;/li&gt;
&lt;li&gt;Server-Side Request Forgery &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The OWASP Top Ten is an essential resource for developers and organizations to enhance the security of their web applications. By understanding and addressing the top ten security risks identified by OWASP, developers can prioritize their security efforts and protect their applications from potential vulnerabilities and attacks.&lt;/p&gt;

&lt;p&gt;In conclusion, the OWASP Top Ten serves as a valuable guide for building more secure and resilient applications. By following the best practices and recommendations provided by OWASP, developers can significantly improve the security posture of their software applications, ultimately safeguarding both the organization and its users.&lt;/p&gt;

&lt;p&gt;Happy Hacking!&lt;/p&gt;

</description>
      <category>owasp</category>
      <category>nullchapter</category>
      <category>vulnerabilities</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
