SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
CopyrightBeeWare2013
Formoreinformation:www.bee-ware.net/en
AboutBeeWare:BeeWareisaEuropeanproviderofsolutionsforsecurityandavailabilityofWebapplications.BeeWare’si-Suitesolutionprovides
organizationsofallsizeswiththemeansto ghtthegrowingthreatsthatcanimpacttheiractivitywhileensuringoptimumqualityofserviceand
performance.
Sources:BeeWare,EconomieetSociété,IDC,InfographicsMania,InternetRetailer,IVIZ,LesEchos,
MMcAfee,OpinionWay,OWASP,PonemonInstitut,SANSInstitute,UNODC,WhiteHat.
From AUserPerspective
60% ofpeopleusethesame
passwordacrossmultiplesites
55% ofcompaniesareconcerned
withidentitytheft
49% ofusersdonotusecomplexpasswords
ordonotchangethemregularly
From ACompanyPerspective
73%
90%
30%
99%
42%
8/10websiteshaveserious
vulnerabilities
oforganizationshavebeenhacked
atleastoncethroughinsecure
webapplications
ofdetectedhackingincidents
areneverdisclosedtothegeneralpublic
ofthehackedorganizationsalready
knewtheirvulnerability
oflogsarereviewedormonitored
onlywhenalertsareraised
ofintrusionsresultfrom
theexploitationofknown
vulnerabilities
OntheUserSide
Donotusepersonalinformationinpasswords
Usedifferentpasswordsforyourvariousaccounts
Setup2-factorauthenticationwheneverpossible
Donotusepubliccomputersorpersonal
smartphonestoaccesscorporatesensitivedata
1
2
3
4
OntheApplicationSide
Secureallwebadministrationdomains
withSSLprotocol(https)
Donotsettlefordefaultcon guration
ofaccountsandpro lesinnetworkand
securityproducts
DeletealldefaultaccountsfromyourIT
pproducts
Adjustyoursecuritypoliciestothecriticality
oftheinformation
Apply xesandupdatestoyourweb
applicationsandinfrastructurefrequently
andregularly
DonottrustHTTPreferrers(tooeasytoforge)
UUseawebapplication rewallspecically
con guredforyourenvironment
Securewebapplicationadminzones
byrestrictingauthorizedIPaddresses
Validatedataentryontheserverside
(ratherthanclient)
Reduceinformationdisclosingbychanging
AApacheServerTokensandbycreatingsecure
errormessages
11
12
13
14
15
16
17
18
19
20
OntheServerSide
Userootaccountonlywhennecessary
UsePrivateNetworksforinternalservertraffic
wheneverpossible
Logeveryadminaccesswithtimestamp
andnameofeveryuser
Monitorwebtrafficforanyunusualtraffic
oraoractivity
Runlocalandremotesecurityscans
onaregularbasis
Testoutyourbackups
5
6
7
8
9
10
$1trillion
$3.5billion
$2,86million
Totalestimatedcostofcybercriminality:upto$1trillionayear
Identitytheftgenerates$1billionperyear
ThecostrelatedtodatalossandtheftinFrance
isapproximately
$2,86millionper“incident”
Onlinefraudcosttotaled$3.5billionin2012
fore-retailers
SecurityPolicy
oforganizationsdonothaveaformal
documentedsecuritypolicyinplace35%
Cloud&SaaS
Agree
Disagree
Neutral
45%
22%
33%
Thepotentialsecurityrisksintroducedbycloud
computingandSaaSfaroutweighthebene ts
Increasingvolumeofthreatsand/orattacks 63%
Increasingsophisticationofattacks 61%
Complexityofsecuritysolutions 53%
Themostfrequentlyquotedchallenges
SecurityChallenges
64% Difficultyinsecuring
webapplications60% Web2.0use
byemployees
Themostimportantchallengesoverthenext12months
20tips
Consequences
MajorWebSecurityRisks
ANOVERVIEW
OFWEBSECURITY
DatapresentedandconsolidatedbyBeeWare

Weitere ähnliche Inhalte

Was ist angesagt?

The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App FraudJim Nichols
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Business model canvas tuting
Business model canvas tutingBusiness model canvas tuting
Business model canvas tutingJnel Tuting
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic diTii
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondCompTIA
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Luis Noguera
 

Was ist angesagt? (10)

The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Business model canvas tuting
Business model canvas tutingBusiness model canvas tuting
Business model canvas tuting
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
Anti-Malvertising Guidelines
Anti-Malvertising GuidelinesAnti-Malvertising Guidelines
Anti-Malvertising Guidelines
 
Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic
 
Ad Blocking by Browser US March 2019
Ad Blocking by Browser US March 2019Ad Blocking by Browser US March 2019
Ad Blocking by Browser US March 2019
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
Mbs w23
Mbs w23Mbs w23
Mbs w23
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 

Andere mochten auch

La vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaLa vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaKracopayner
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
Claudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing careerClaudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing careerclaudine7874
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home careTracy Steel
 
Traumatic Brain Injury Infographic
Traumatic Brain Injury InfographicTraumatic Brain Injury Infographic
Traumatic Brain Injury InfographicTracy Steel
 
Carewatch Home Care #CultureCode
Carewatch Home Care #CultureCodeCarewatch Home Care #CultureCode
Carewatch Home Care #CultureCodeTracy Steel
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysisBee_Ware
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012Bee_Ware
 
Higgs bosob machine learning challange
Higgs bosob machine learning challangeHiggs bosob machine learning challange
Higgs bosob machine learning challangeTharindu Ranasinghe
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Technology integration
Technology integrationTechnology integration
Technology integrationbriggsad
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Bee_Ware
 

Andere mochten auch (20)

La vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaLa vida al voltant de la mediterrànea
La vida al voltant de la mediterrànea
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
ecoupons
ecouponsecoupons
ecoupons
 
Claudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing careerClaudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing career
 
Work incentives
Work incentivesWork incentives
Work incentives
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home care
 
Traumatic Brain Injury Infographic
Traumatic Brain Injury InfographicTraumatic Brain Injury Infographic
Traumatic Brain Injury Infographic
 
Intro
IntroIntro
Intro
 
Carewatch Home Care #CultureCode
Carewatch Home Care #CultureCodeCarewatch Home Care #CultureCode
Carewatch Home Care #CultureCode
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
Vivarana literature survey
Vivarana literature surveyVivarana literature survey
Vivarana literature survey
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012
 
Higgs bosob machine learning challange
Higgs bosob machine learning challangeHiggs bosob machine learning challange
Higgs bosob machine learning challange
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
WK2 Project: Storyboard
WK2 Project: StoryboardWK2 Project: Storyboard
WK2 Project: Storyboard
 
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 

Ähnlich wie An overview of web security

Expert Web App Pen Testing - Aardwolf Security.pptx
Expert Web App Pen Testing - Aardwolf Security.pptxExpert Web App Pen Testing - Aardwolf Security.pptx
Expert Web App Pen Testing - Aardwolf Security.pptxAardwolf Security
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteJeremiah Grossman
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)IndusfacePvtLtd
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIOBulletin1
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
A Proposal to Improve Security of IT Systems in UOTC Inc..docx
A Proposal to Improve Security of IT Systems in UOTC Inc..docxA Proposal to Improve Security of IT Systems in UOTC Inc..docx
A Proposal to Improve Security of IT Systems in UOTC Inc..docxbartholomeocoombs
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 IDG Connect
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Uniphore
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3Carlos Villafane
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009diTii
 

Ähnlich wie An overview of web security (20)

Expert Web App Pen Testing - Aardwolf Security.pptx
Expert Web App Pen Testing - Aardwolf Security.pptxExpert Web App Pen Testing - Aardwolf Security.pptx
Expert Web App Pen Testing - Aardwolf Security.pptx
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security Companies
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
A Proposal to Improve Security of IT Systems in UOTC Inc..docx
A Proposal to Improve Security of IT Systems in UOTC Inc..docxA Proposal to Improve Security of IT Systems in UOTC Inc..docx
A Proposal to Improve Security of IT Systems in UOTC Inc..docx
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009
 

Mehr von Bee_Ware

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnellesBee_Ware
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape reportBee_Ware
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudBee_Ware
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Bee_Ware
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBee_Ware
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Bee_Ware
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsBee_Ware
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to goBee_Ware
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesBee_Ware
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéBee_Ware
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsBee_Ware
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Bee_Ware
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
X force report 2013
X force report 2013X force report 2013
X force report 2013Bee_Ware
 
Tour d'horizon de la sécurité Web
Tour d'horizon de la sécurité WebTour d'horizon de la sécurité Web
Tour d'horizon de la sécurité WebBee_Ware
 

Mehr von Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
X force report 2013
X force report 2013X force report 2013
X force report 2013
 
Tour d'horizon de la sécurité Web
Tour d'horizon de la sécurité WebTour d'horizon de la sécurité Web
Tour d'horizon de la sécurité Web
 

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

An overview of web security

  • 1. CopyrightBeeWare2013 Formoreinformation:www.bee-ware.net/en AboutBeeWare:BeeWareisaEuropeanproviderofsolutionsforsecurityandavailabilityofWebapplications.BeeWare’si-Suitesolutionprovides organizationsofallsizeswiththemeansto ghtthegrowingthreatsthatcanimpacttheiractivitywhileensuringoptimumqualityofserviceand performance. Sources:BeeWare,EconomieetSociété,IDC,InfographicsMania,InternetRetailer,IVIZ,LesEchos, MMcAfee,OpinionWay,OWASP,PonemonInstitut,SANSInstitute,UNODC,WhiteHat. From AUserPerspective 60% ofpeopleusethesame passwordacrossmultiplesites 55% ofcompaniesareconcerned withidentitytheft 49% ofusersdonotusecomplexpasswords ordonotchangethemregularly From ACompanyPerspective 73% 90% 30% 99% 42% 8/10websiteshaveserious vulnerabilities oforganizationshavebeenhacked atleastoncethroughinsecure webapplications ofdetectedhackingincidents areneverdisclosedtothegeneralpublic ofthehackedorganizationsalready knewtheirvulnerability oflogsarereviewedormonitored onlywhenalertsareraised ofintrusionsresultfrom theexploitationofknown vulnerabilities OntheUserSide Donotusepersonalinformationinpasswords Usedifferentpasswordsforyourvariousaccounts Setup2-factorauthenticationwheneverpossible Donotusepubliccomputersorpersonal smartphonestoaccesscorporatesensitivedata 1 2 3 4 OntheApplicationSide Secureallwebadministrationdomains withSSLprotocol(https) Donotsettlefordefaultcon guration ofaccountsandpro lesinnetworkand securityproducts DeletealldefaultaccountsfromyourIT pproducts Adjustyoursecuritypoliciestothecriticality oftheinformation Apply xesandupdatestoyourweb applicationsandinfrastructurefrequently andregularly DonottrustHTTPreferrers(tooeasytoforge) UUseawebapplication rewallspecically con guredforyourenvironment Securewebapplicationadminzones byrestrictingauthorizedIPaddresses Validatedataentryontheserverside (ratherthanclient) Reduceinformationdisclosingbychanging AApacheServerTokensandbycreatingsecure errormessages 11 12 13 14 15 16 17 18 19 20 OntheServerSide Userootaccountonlywhennecessary UsePrivateNetworksforinternalservertraffic wheneverpossible Logeveryadminaccesswithtimestamp andnameofeveryuser Monitorwebtrafficforanyunusualtraffic oraoractivity Runlocalandremotesecurityscans onaregularbasis Testoutyourbackups 5 6 7 8 9 10 $1trillion $3.5billion $2,86million Totalestimatedcostofcybercriminality:upto$1trillionayear Identitytheftgenerates$1billionperyear ThecostrelatedtodatalossandtheftinFrance isapproximately $2,86millionper“incident” Onlinefraudcosttotaled$3.5billionin2012 fore-retailers SecurityPolicy oforganizationsdonothaveaformal documentedsecuritypolicyinplace35% Cloud&SaaS Agree Disagree Neutral 45% 22% 33% Thepotentialsecurityrisksintroducedbycloud computingandSaaSfaroutweighthebene ts Increasingvolumeofthreatsand/orattacks 63% Increasingsophisticationofattacks 61% Complexityofsecuritysolutions 53% Themostfrequentlyquotedchallenges SecurityChallenges 64% Difficultyinsecuring webapplications60% Web2.0use byemployees Themostimportantchallengesoverthenext12months 20tips Consequences MajorWebSecurityRisks ANOVERVIEW OFWEBSECURITY DatapresentedandconsolidatedbyBeeWare