SlideShare a Scribd company logo
1 of 29
Viruses & Application Security
Agenda
• What Is Computer Virus
• Symptoms
• How does it spread
• Types Of Viruses
• Other Programs similar to Viruses
• Application Security
• Why Application Security Is Important
• Why Often Application Security Is Ignored
• Basic Security Concepts
• Securing the Application
• Conclusion
What is a computer virus?
• Computer viruses are a type of software program that is like a
biological virus, replicate and spread without the users
knowledge
• Some virus may display only a message on the screen, others
may slow down the Pc
• They can also erase files or even format your floppy or hard
disk and crash the system
Symptoms
• Letters looks like they are falling to the bottom of the screen.
• The computer system becomes slow.
• The size of available free memory reduces.
• The hard disk runs out of space.
• The computer does not boot.
How does it spread
• Computer viruses spread by attaching themselves to other
computer program files
• When you exchange a file from pen drive with virus into our Pc,
the virus spreads from one file to the another
• Viruses also spreads when a Computer Engineer comes to repair
your system and puts his/her diagnostics disks in your PC
Programs Effecting Computers

Computer Viruses

Malwares

Worms

Trojan horses

Spyware

Adware
Types of viruses

Resident

Direct Action

Overwrite

Boot

Macro

Directory
Polymorphic
File Infectors
Companion
Fat
Logic Bombs
Resident Virus
 A virus that takes up permanent residence in the RAM
memory. It can take over or interupt any operation executed
by the computer system. It can corrupt files and programs;
such as copy, open, close, rename and more.
 Examples: Randex, CMJ, Meve, and MrKlunky.
Direct Action Virus
 A batch file that resides in the root directory of the hard disk.
When executed it will infect files in the directory and also
directed to the batch file AUTOEXEC.BAT file PATH.
Overwrite Virus
 A virus that deletes of overwrites part or all of the information
in a file, making them partially or totally worthless. To get
rid of the virus, the file has to be deleted.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
• A virus that affects the boot sector of the hard drive or a
floppy drive. The boot sector gives the computer information
on how to boot, if it is not functioning the computer won't
boot. To avoid a boot virus, don't boot your computer with an
unknown floppy disk in your floppy drive and make sure it is
write protected.
Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Virus
 A virus written in a macro language that infects the files that
were created with it. When the file is opened the macro virus
runs automatically. This may arrive on your computer by
email attachment.
Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.
Directory Virus

Directory viruses will replace an existing executable and
move the real file somewhere else, so when you run it you are
unknowingly running the virus program instead of the
original. It then becomes impossible to find the original file.
Polymorphic Virus
 Viruses that encode or encrypt themselves so that each new
version is different. This enables them to replicate and very
hard for virus scanners to track down.
File Infectors
 The majority of viruses are file infectors. This virus is
activated by running an executable file like .exe or .com
extension files. Once run, the virus does its damage
according to the program in the executable file.
Companion Virus
 Once the system is infected they accompany the files that
already exist. They can lay in wait or take action
immediately.
Some examples include: Stator, Asimov.1539, and
Terrax.1069
Fat Virus
 This virus will only infect a computer running a file
allocation table (FAT) file system. This virus will prevent
access to parts of the hard drive preventing files to be
accessed Newer windows computers use NTFS and don't
need to worry about this virus.
Computers Must Exist within a
Secure Infrastructure
 Harden systems
 Use concept of least-privilege
 Patch management
 Firewalls
 Using Anti Virus Programs
 Intrusion detection
 Virus protection
Application Security
 An application is a program or group of programs designed for
end users.
 Security is the degree of resistance to, or protection from, harm.
It applies to any vulnerable and valuable asset, such as a person,
dwelling, community, nation, or organization.
 Application security is the use of software, hardware, and
procedural methods to protect applications from external and
internal threats.
Why Is Application Security
Important?
• New threats emerge every day
• Some hackers are not satisfied with penetrating your
network, they seek information that resides in your
applications/databases
• Applications are often with poor designs, software bugs,
and poor programming practices
• Applications may be a fast and have an easy entry point into
a secure network
• Applications contain and process your most critical
(important and sensitive) information
• Programming logic may be exposed to the possibility of being
attacked just as troublesome as difficulties inherent with
certain technologies
Why Is Application Security
Often Ignored?
 Usually there are time and budget constraints in application
development that cause proper testing and secure programming
training to fall to the way aside
 Security is typically not prioritized by programming teams, they
are paid to deliver functionality first and foremost
 E-commerce initiatives are often rushed into production
 Organizations often expect the software manufacturer “build in”
security is 80% process driven, 20% software driven
Four Basic Security Concepts
Poor application security measures can lead to breaches in data:
 Data Integrity
 Confidentiality
 Availability
 Accountability
Data Integrity
• Data Integrity means having a secure and reliable data in the
database
• Protection of information from tampering, forgery, or accidental
changes.
Examples:
• January 2004, there were 13,654 known attacks on Linux
Servers
Confidentiality
 Ensures that applications and data is accessible to only the users
intended and authorized to have access.
 Examples : While Login in Providing Id’s and Passwords
Availability
 Ensures that authorized users have access to the application and
the data when required.
 Example: Microsoft Developer Store
 Checking PNR Status Indian Railway Systems
Accountability Within the
Application
 Ensure accuracy of data and guide against unauthorized
modifications
 Who did what with your data?
 Examples : Having Notification To Our Mobiles From Social
Networking Sites
Securing the Application
 Authentication & Identification
 Authorization & Access Control
 Logging & Auditing Procedures
 Managing User Sessions
 Cryptography
 Examples: Ceaser Cipher Text Modification, RSAAlgorithms etc
Conclusion
Every Application must be developed in Ethical hacking
perspective
Prevent the loss, modification, or misuse of application systems
“data” or application architecture. Here we are focusing on
web-enabled systems
Making an e-commerce application secure is much harder than
just adding a password protected login screen!
Thank You

More Related Content

What's hot (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

Zika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virusZika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virusNarayan Prahlad
 
Replication of DNA Virus Genomes
Replication of DNA Virus GenomesReplication of DNA Virus Genomes
Replication of DNA Virus GenomesYora Permata Dewi
 
Epidemology and control of protozoan parasite
Epidemology and control of protozoan parasiteEpidemology and control of protozoan parasite
Epidemology and control of protozoan parasiteswarnendu basak
 
Cultivation of Viruses
Cultivation of VirusesCultivation of Viruses
Cultivation of VirusesIslam Sarakbi
 
Chapter 2 classification of virus
Chapter 2 classification of virusChapter 2 classification of virus
Chapter 2 classification of virusAlia Najiha
 
Virus structure: classification: replication
Virus structure: classification: replicationVirus structure: classification: replication
Virus structure: classification: replicationMarilen Parungao
 

Viewers also liked (8)

Zika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virusZika Virus-Epidemology and charecterisitics of zika virus
Zika Virus-Epidemology and charecterisitics of zika virus
 
Replication of DNA Virus Genomes
Replication of DNA Virus GenomesReplication of DNA Virus Genomes
Replication of DNA Virus Genomes
 
Epidemology and control of protozoan parasite
Epidemology and control of protozoan parasiteEpidemology and control of protozoan parasite
Epidemology and control of protozoan parasite
 
Cultivation of Viruses
Cultivation of VirusesCultivation of Viruses
Cultivation of Viruses
 
Chapter 2 classification of virus
Chapter 2 classification of virusChapter 2 classification of virus
Chapter 2 classification of virus
 
Zika virus
Zika virusZika virus
Zika virus
 
Virus structure: classification: replication
Virus structure: classification: replicationVirus structure: classification: replication
Virus structure: classification: replication
 
Bacteriophage vectors
Bacteriophage vectorsBacteriophage vectors
Bacteriophage vectors
 

Similar to Secure Your Apps: Understanding Application Security Risks & Best Practices

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Program security
Program securityProgram security
Program securityG Prachi
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVIKASH MAINANWAL
 

Similar to Secure Your Apps: Understanding Application Security Risks & Best Practices (20)

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Program security
Program securityProgram security
Program security
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Secure Your Apps: Understanding Application Security Risks & Best Practices

  • 2. Agenda • What Is Computer Virus • Symptoms • How does it spread • Types Of Viruses • Other Programs similar to Viruses • Application Security • Why Application Security Is Important • Why Often Application Security Is Ignored • Basic Security Concepts • Securing the Application • Conclusion
  • 3. What is a computer virus? • Computer viruses are a type of software program that is like a biological virus, replicate and spread without the users knowledge • Some virus may display only a message on the screen, others may slow down the Pc • They can also erase files or even format your floppy or hard disk and crash the system
  • 4. Symptoms • Letters looks like they are falling to the bottom of the screen. • The computer system becomes slow. • The size of available free memory reduces. • The hard disk runs out of space. • The computer does not boot.
  • 5. How does it spread • Computer viruses spread by attaching themselves to other computer program files • When you exchange a file from pen drive with virus into our Pc, the virus spreads from one file to the another • Viruses also spreads when a Computer Engineer comes to repair your system and puts his/her diagnostics disks in your PC
  • 6. Programs Effecting Computers  Computer Viruses  Malwares  Worms  Trojan horses  Spyware  Adware
  • 7. Types of viruses  Resident  Direct Action  Overwrite  Boot  Macro  Directory Polymorphic File Infectors Companion Fat Logic Bombs
  • 8. Resident Virus  A virus that takes up permanent residence in the RAM memory. It can take over or interupt any operation executed by the computer system. It can corrupt files and programs; such as copy, open, close, rename and more.  Examples: Randex, CMJ, Meve, and MrKlunky.
  • 9. Direct Action Virus  A batch file that resides in the root directory of the hard disk. When executed it will infect files in the directory and also directed to the batch file AUTOEXEC.BAT file PATH.
  • 10. Overwrite Virus  A virus that deletes of overwrites part or all of the information in a file, making them partially or totally worthless. To get rid of the virus, the file has to be deleted. Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
  • 11. Boot Virus • A virus that affects the boot sector of the hard drive or a floppy drive. The boot sector gives the computer information on how to boot, if it is not functioning the computer won't boot. To avoid a boot virus, don't boot your computer with an unknown floppy disk in your floppy drive and make sure it is write protected. Examples of boot viruses include: Polyboot.B, AntiEXE.
  • 12. Macro Virus  A virus written in a macro language that infects the files that were created with it. When the file is opened the macro virus runs automatically. This may arrive on your computer by email attachment. Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
  • 13. Directory Virus  Directory viruses will replace an existing executable and move the real file somewhere else, so when you run it you are unknowingly running the virus program instead of the original. It then becomes impossible to find the original file.
  • 14. Polymorphic Virus  Viruses that encode or encrypt themselves so that each new version is different. This enables them to replicate and very hard for virus scanners to track down.
  • 15. File Infectors  The majority of viruses are file infectors. This virus is activated by running an executable file like .exe or .com extension files. Once run, the virus does its damage according to the program in the executable file.
  • 16. Companion Virus  Once the system is infected they accompany the files that already exist. They can lay in wait or take action immediately. Some examples include: Stator, Asimov.1539, and Terrax.1069
  • 17. Fat Virus  This virus will only infect a computer running a file allocation table (FAT) file system. This virus will prevent access to parts of the hard drive preventing files to be accessed Newer windows computers use NTFS and don't need to worry about this virus.
  • 18. Computers Must Exist within a Secure Infrastructure  Harden systems  Use concept of least-privilege  Patch management  Firewalls  Using Anti Virus Programs  Intrusion detection  Virus protection
  • 19. Application Security  An application is a program or group of programs designed for end users.  Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.  Application security is the use of software, hardware, and procedural methods to protect applications from external and internal threats.
  • 20. Why Is Application Security Important? • New threats emerge every day • Some hackers are not satisfied with penetrating your network, they seek information that resides in your applications/databases • Applications are often with poor designs, software bugs, and poor programming practices • Applications may be a fast and have an easy entry point into a secure network • Applications contain and process your most critical (important and sensitive) information • Programming logic may be exposed to the possibility of being attacked just as troublesome as difficulties inherent with certain technologies
  • 21. Why Is Application Security Often Ignored?  Usually there are time and budget constraints in application development that cause proper testing and secure programming training to fall to the way aside  Security is typically not prioritized by programming teams, they are paid to deliver functionality first and foremost  E-commerce initiatives are often rushed into production  Organizations often expect the software manufacturer “build in” security is 80% process driven, 20% software driven
  • 22. Four Basic Security Concepts Poor application security measures can lead to breaches in data:  Data Integrity  Confidentiality  Availability  Accountability
  • 23. Data Integrity • Data Integrity means having a secure and reliable data in the database • Protection of information from tampering, forgery, or accidental changes. Examples: • January 2004, there were 13,654 known attacks on Linux Servers
  • 24. Confidentiality  Ensures that applications and data is accessible to only the users intended and authorized to have access.  Examples : While Login in Providing Id’s and Passwords
  • 25. Availability  Ensures that authorized users have access to the application and the data when required.  Example: Microsoft Developer Store  Checking PNR Status Indian Railway Systems
  • 26. Accountability Within the Application  Ensure accuracy of data and guide against unauthorized modifications  Who did what with your data?  Examples : Having Notification To Our Mobiles From Social Networking Sites
  • 27. Securing the Application  Authentication & Identification  Authorization & Access Control  Logging & Auditing Procedures  Managing User Sessions  Cryptography  Examples: Ceaser Cipher Text Modification, RSAAlgorithms etc
  • 28. Conclusion Every Application must be developed in Ethical hacking perspective Prevent the loss, modification, or misuse of application systems “data” or application architecture. Here we are focusing on web-enabled systems Making an e-commerce application secure is much harder than just adding a password protected login screen!