SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Unit 8: Security for Web Applications
 Security is fundamentally about protecting assets (data, hardware,
    reputation, etc.). Therefore you should
          Identify potential threats
      

          Detect and fix vulnerabilities
      

          Know how to react to an attack
      

   A threat is any potential occurrence, malicious or otherwise, that could
    harm an asset.
   A vulnerability is a weakness that makes a threat possible, due to poor
    design, configuration mistakes, and/or inappropriate and insecure coding
    techniques.
   An attack is an action that exploits a vulnerability or enacts a threat.
    Examples:
         sending malicious input to an application
         flooding a network in an attempt to deny service.

dsbw 2008/2009 2q                                                              1
Foundations of Security
 Authentication (who are you?): the process of uniquely identifying
    the clients of your applications and services.
 Authorization (what can you do?): the process that governs the
    resources and operations that the authenticated client is permitted
    to access.
 Non-repudiation: guarantees that a user cannot deny performing
    an operation or initiating a transaction.
 Confidentiality: the process of making sure that data remains
    private and confidential, and that it cannot be viewed by
    unauthorized people.
 Integrity: the guarantee that data is protected from accidental or
    deliberate (malicious) modification.
 Availability: systems remain available for legitimate users.


dsbw 2008/2009 2q                                                         2
Main Threat Categories: STRIDE
 Spoofing: Attempting to gain access to a system by using a false
  identity, eg. using stolen user credentials or a false IP address.
 Tampering: Unauthorized modification of data, for example as it
  flows over a network between two computers.
 Repudiation: The ability of users (legitimate or otherwise) to deny
  that they performed specific actions or transactions. Without
  adequate auditing, repudiation attacks are difficult to prove
 Information disclosure: Unwanted exposure of private data.
 Denial of service: The process of making a system or application
  unavailable.
 Elevation of privilege: Occurs when a user with limited privileges
  assumes the identity of a privileged user to gain privileged access to
  an application.


dsbw 2008/2009 2q                                                       3
STRIDE Countermeasures
                         Use strong authentication.
Spoofing user identity
                         Do not store secrets (eg., passwords) in plaintext.
                         Do not pass credentials in plaintext over the wire.
                         Protect authentication cookies with SSL.
                         Use data hashing and signing.
Tampering with data
                         Use digital signatures.
                         Use tamper-resistant protocols
                         Use protocols that provide message integrity.
                         Create secure audit trails.
Repudiation
                         Use digital signatures.
                         Use strong authorization.
Information disclosure
                         Use strong encryption.
                         Use protocols that provide message confidentiality.
                         Do not store secrets in plaintext.
                         Use resource and bandwidth throttling techniques.
Denial of service
                         Validate and filter input.
                         The principle of least privilege: use least privileged
Elevation of privilege
                         accounts to run processes and access resources.

dsbw 2008/2009 2q                                                                 4
Core Web Application Security Principles
 Compartmentalize          Create different security boundaries, zones, with their own
                           policies
 Use least privilege       Run processes using accounts with minimal privileges and
                           access rights
 Apply defense in depth    Use multiple gatekeepers to keep attackers at bay, do not
                           rely on a single layer of security
 Do not trust user input   Assume all input is malicious until proven otherwise
                           Authenticate and authorize callers early — at the first gate
 Check at the gate
 Fail securely             If an application fails, do not leave sensitive data
                           accessible. Return friendly errors to end users that do not
                           expose internal system details.
 Secure the weakest        Identify it, strengthen it, fix it
 link
 Create secure defaults    Make default users/actions/authorizations set up with least
                           privilege
 Reduce your attack        Disable or remove unused services, protocols, and
 surface                   functionality.

dsbw 2008/2009 2q                                                                         5
Web Application Security: The Three-Tiered Approach




dsbw 2008/2009 2q                                 6
Integrating Security in the WebApp Process




dsbw 2008/2009 2q                            7
The RACI Chart (Responsible, Accountable, Consulted, Kept Informed)
                                             System                               Security
            Tasks              Architect                   Developer   Tester
                                           Administrator                        Professional
       Security Policies                        R                                    A
       Threat Modeling            A                            I         I           R

  Security Design Principles      A              I             I                     C

     Security Architecture        A             C                                    R
   Architecture and Design
                                  R                                                  A
           Review
     Code Development                                         A                      R
 Technology Specific Threats                                  A                      R
        Code Review                                           R          I           A
       Security Testing           C                            I         A           C
      Network Security            C             R                                    A
        Host Security             C             A              I                     R
     Application Security         C              I            A                      R
     Deployment Review            C             R              I         I           A


dsbw 2008/2009 2q                                                                         8
Network Threats and Countermeasures
Threat          Description                             Countermeasure
Information     Port scanning and footprinting to       Configure routers to restrict their
Gathering       detect device types and vulnerable      responses to footprinting requests.
                operating systems and application       Disable unused protocols and
                versions.                               unnecessary ports.
Sniffing        Monitoring traffic on the network for   Use encrypted protocols (SSL,
                data such as plaintext passwords or     IPSec)
                configuration information
                Hiding one’s true identity on the
Spoofing                                                Filter packets
                network by using fake source
                addresses
Session         Deceiving a server or a client into     Use encrypted session negotiation
Hijacking       accepting the upstream host as the      and communication channels.
                actual legitimate host
Denial of       Denying legitimate users access to a    Increase the size of the TCP
Service         server or services, e.g by sending      connection queue, decrease the
                more requests to a server than it can   connection establishment period,
                handle (SYN flood attack)               and employ dynamic backlog
                                                        mechanisms.

dsbw 2008/2009 2q                                                                        9
Host Threats and Countermeasures
Threat                     Description                    Countermeasure
Viruses, Trojan horses,                                   Updated service packs and
and worms                                                 software patches
Footprinting               port scans, ping sweeps, and   Disable unnecessary
                           NetBIOS enumeration to         protocols and ports
                           glean valuable system-level
                           information
Password Cracking                                         Use strong passwords, limit
                                                          the number of retry
                                                          attempts, do not use default
                                                          account names
Denial of Service                                         Deviate traffic to other hosts

Arbitrary Code Execution   Executing malicious code on    Lock down system
                           your server by using buffer    commands and utilities
                           overflow attacks.
Unauthorized Access        Unauthorized access to         Lock down files and folders
                           restricted information or      with restricted permissions.
                           operations

dsbw 2008/2009 2q                                                                     10
Application Threats
  Category                 Threats
  Input validation         Buffer overflow: cross-site scripting; SQL injection; canonicalization
  Authentication           Network eavesdropping; brute force attacks; dictionary attacks; cookie
                           replay; credential theft
  Authorization            Elevation of privilege; disclosure of confidential data; data tampering;
                           luring attacks
  Configuration            Unauthorized access to administration interfaces; unauthorized access
  management               to configuration stores; retrieval of clear text configuration data; lack of
                           individual accountability; over-privileged process and service accounts

  Sensitive data           Access sensitive data in storage; network eavesdropping; data
                           tampering
  Session management       Session hijacking; session replay; man in the middle
  Cryptography             Poor key generation or key management; weak or custom encryption

  Parameter manipulation   Query string manipulation; form field manipulation; cookie manipulation;
                           HTTP header manipulation
  Exception management     Information disclosure; denial of service
  Auditing and logging     User denies performing an operation; attacker exploits an application
                           without trace; attacker covers his or her tracks

dsbw 2008/2009 2q                                                                                         11
Application Countermeasures
  Category           Countermesures
  Input Validation   Do not trust input; consider centralized input validation. Do not rely on
                     client-side validation. Be careful with canonicalization issues. Constrain.
                     reject, and sanitize input. Validate for type, length, format, and range.
  Authentication     Partition site by anonymous, identified, and authenticated area. Use
                     strong passwords. Support password expiration periods and account
                     disablement. Do not store credentials (use one-way hashes with salt).
                     Encrypt communication channels to protect authentication tokens. Pass
                     Forms authentication cookies only over HTTPS connections.

  Authorization      Use least privileged accounts. Consider authorization granularity. Enforce
                     separation of privileges. Restrict user access to system-level resources.
  Configuration      Use least privileged process and service accounts. Do not store
  Management         credentials in plaintext. Use strong authentication and authorization on
                     administration interfaces. Do not use the LSA. Secure the
                     communication channel for remote administration. Avoid storing sensitive
                     data in the Web space.

  Sensitive Data     Avoid storing secrets. Encrypt sensitive data over the wire. Secure the
                     communication channel. Provide strong access controls on sensitive data
                     stores. Do not store sensitive data in persistent cookies. Do not pass
                     sensitive data using the HTTP-GET protocol.


dsbw 2008/2009 2q                                                                                  12
Application Countermeasures (cont.)

 Category                 Countermeasures
 Session Management       Limit the session lifetime. Secure the channel. Encrypt the contents of
                          authentication cookies. Protect session state from unauthorized access.
 Cryptography             Do not develop your own. Use tried and tested platform features. Keep
                          unencrypted data close to the algorithm. Use the right algorithm and key
                          size. Avoid key management (use DPAPI). Cycle your keys periodically.
                          Store keys in a restricted location.

 Parameter Manipulation   Encrypt sensitive cookie state. Do not trust fields that the client can
                          manipulate (query strings, form fields, cookies, or HTTP headers).
                          Validate all values sent from the client.
 Exception Management     Use structured exception handling. Do not reveal sensitive application
                          implementation details. Do not log private data such as passwords.
                          Consider a centralized exception management framework.

 Auditing and Logging     Identify malicious behavior. Know what good traffic looks like. Audit and
                          log activity through all of the application tiers. Secure access to log files.
                          Back up and regularly analyze log files.




dsbw 2008/2009 2q                                                                                     13
Web Application Security: Summary




dsbw 2008/2009 2q                   14
Cryptography

   ―
 The coding of messages so as to render them unintelligible to other
  than authorized recipients. Many techniques are known for the
  conversion of the original message, known as plaintext, into its
                                                           ‖
  encrypted form, known as ciphertext, cipher, or code
                    Dictionary of Computing. Oxford University Press, 2004




dsbw 2008/2009 2q                                                      15
Roles for Cryptography
 Authentication: Digital signatures can be used to identify a
    participant in a web transaction or the author of an email message

 Authorization: Cryptographic techniques can be used to distribute
    a list of authorized users that is all but impossible to falsify.

 Confidentiality: Encryption is used to scramble information sent
    over networks and stored on servers so that eavesdroppers cannot
    access the data's content

 Integrity: Methods that are used to verify that a message has not
    been modified while in transit. Often, this is done with digitally
    signed message digest codes.

 Nonrepudiation: Cryptographic receipts are created so that an
    author of a message cannot realistically deny sending a message


dsbw 2008/2009 2q                                                        16
Symmetric Key Cryptography




dsbw 2008/2009 2q            17
Public Key (aka Asymmetric) Cryptography




dsbw 2008/2009 2q                          18
Authentication with Public Key Cryptography




dsbw 2008/2009 2q                             19
Digital envelope




dsbw 2008/2009 2q   20
Cryptography-based Internet Protocols
 Virtual Private Networks (VPN)
        Internet Protocol Security (IPSEC)
      
       Point-to-Point Tunneling Protocol (PPTP)
       Layer Two Forwarding (L2F)
       Layer Two Tunneling Protocol (L2TP)

 E-mail Encryption
        Secure Multipurpose Internet Mail Extensions (S/MIME)
      
       Pretty Good Privacy

 WWW i e-commerce
        SSL/TSL
      
       Secure Electronic Transaction (SET)




dsbw 2008/2009 2q                                               21
SSL/TSL
 SSL – Secure Socket Layer

 TLS – Transport Layer Security

 Both provide a secure transport connection between clients and
    servers:
         Authentication of the server, using digital signatures
         Authentication of the client, using digital signatures
         Data confidentiality through the use of encryption
         Data integrity through the use of message authentication codes
 History:
         SSL was developed by Netscape
         SSL version 3.0 has been widely used on the Internet
         SSL evolved into TLS (RFC 2246)
         TLS can be viewed as SSL v3.1


dsbw 2008/2009 2q                                                          22
SSL architecture

               SSL      SSL Change           SSL
                                                       applications
            Handshake   Cipher Spec          Alert
                                                       (e.g., HTTP)
             Protocol     Protocol          Protocol


                            SSL Record Protocol



                                      TCP



                                      IP




dsbw 2008/2009 2q                                                     23
SSL Components
 SSL Record Protocol
         fragmentation
         compression
         message authentication and integrity protection
         encryption
 SSL Handshake Protocol
         negotiation of security algorithms and parameters
         key exchange
         server authentication and optionally client authentication
 SSL Alert Protocol
         error messages (fatal alerts and warnings)
 SSL Change Cipher Spec Protocol
         a single message that indicates the end of the SSL handshake


dsbw 2008/2009 2q                                                        24
SSL sessions and connections
 An SSL session is an association between a client and a server

 SSL sessions are stateful: the session state includes security
    algorithms and parameters

 A SSL session may include multiple secure connections between
    the same client and server

 SSL sessions are used to avoid expensive negotiation of new
    security parameters for each connection




dsbw 2008/2009 2q                                                  25
SSL Record Protocol: Processing
      application data


                                     fragmentation
           SSLPlaintext
           type version length


                                 compression
          SSLCompressed
           type version length


                                 msg authentication and
                                 encryption (with padding if necessary)
          SSLCiphertext
           type version length       MAC padding



dsbw 2008/2009 2q                                                         26
SSL Handshake Protocol
  client                            server
                    client_hello         Phase 1: Negotiation of the session ID, key exchange
                                         algorithm, MAC algorithm, encryption algorithm, and
                    server_hello
                                         exchange of initial random numbers

                     certificate
                                         Phase 2: Server may send its certificate and key
            server_key_exchange
                                         exchange message, and it may request the client
                                         to send a certificate. Server signals end of hello
              certificate_request
                                         phase.
              server_hello_done


                     certificate
                                         Phase 3: Client sends certificate if requested and may
             client_key_exchange         send an explicit certificate verification message.
                                         Client always sends its key exchange message.
               certificate_verify


              change_cipher_spec

                       finished
                                         Phase 4: Change cipher spec and finish handshake
              change_cipher_spec

                       finished
dsbw 2008/2009 2q                                                                               27
References
 http://www.w3.org/Security/Faq/www-security-faq.html


 Web Security, Privacy & Commerce, 2nd Edition, by Simson
    Garfinkle with Gene Spafford, O'Reilly, 2001.

 Improving Web Application Security: Threats and
    Countermeasures, by Microsoft Corporation, Microsoft Press, 2003




dsbw 2008/2009 2q                                                28

Weitere ähnliche Inhalte

Was ist angesagt?

Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testingImaginea
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 
Как автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCКак автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCDenis Batrankov, CISSP
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseRahul Neel Mani
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsDavid Sweigert
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 

Was ist angesagt? (20)

Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Как автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCКак автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOC
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Ids & ips
Ids & ipsIds & ips
Ids & ips
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 

Ähnlich wie [DSBW Spring 2009] Unit 08: WebApp Security

Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud appsCenzic
 
Security best practices
Security best practicesSecurity best practices
Security best practicesAVEVA
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat ModelingDanny Wong
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelineswebhostingguy
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsPort80 Software
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3Eoin Keary
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story42Crunch
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 

Ähnlich wie [DSBW Spring 2009] Unit 08: WebApp Security (20)

Unit 08: Security for Web Applications
Unit 08: Security for Web ApplicationsUnit 08: Security for Web Applications
Unit 08: Security for Web Applications
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
Security best practices
Security best practicesSecurity best practices
Security best practices
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future Musings
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story
 
Day4
Day4Day4
Day4
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 

Mehr von Carles Farré

Aplicacions i serveis web (ASW)
Aplicacions i serveis web (ASW)Aplicacions i serveis web (ASW)
Aplicacions i serveis web (ASW)Carles Farré
 
DSBW Final Exam (Spring Sementer 2010)
DSBW Final Exam (Spring Sementer 2010)DSBW Final Exam (Spring Sementer 2010)
DSBW Final Exam (Spring Sementer 2010)Carles Farré
 
Web Usability (Slideshare Version)
Web Usability (Slideshare Version)Web Usability (Slideshare Version)
Web Usability (Slideshare Version)Carles Farré
 
[DSBW Spring 2010] Unit 10: XML and Web And beyond
[DSBW Spring 2010] Unit 10: XML and Web And beyond[DSBW Spring 2010] Unit 10: XML and Web And beyond
[DSBW Spring 2010] Unit 10: XML and Web And beyondCarles Farré
 
[DSBW Spring 2009] Unit 09: Web Testing
[DSBW Spring 2009] Unit 09: Web Testing[DSBW Spring 2009] Unit 09: Web Testing
[DSBW Spring 2009] Unit 09: Web TestingCarles Farré
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)Carles Farré
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)Carles Farré
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)Carles Farré
 
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)Carles Farré
 
[DSBW Spring 2009] Unit 05: Web Architectures
[DSBW Spring 2009] Unit 05: Web Architectures[DSBW Spring 2009] Unit 05: Web Architectures
[DSBW Spring 2009] Unit 05: Web ArchitecturesCarles Farré
 
[DSBW Spring 2009] Unit 04: From Requirements to the UX Model
[DSBW Spring 2009] Unit 04: From Requirements to the UX Model[DSBW Spring 2009] Unit 04: From Requirements to the UX Model
[DSBW Spring 2009] Unit 04: From Requirements to the UX ModelCarles Farré
 
[DSBW Spring 2009] Unit 03: WebEng Process Models
[DSBW Spring 2009] Unit 03: WebEng Process Models[DSBW Spring 2009] Unit 03: WebEng Process Models
[DSBW Spring 2009] Unit 03: WebEng Process ModelsCarles Farré
 
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)[DSBW Spring 2009] Unit 02: Web Technologies (2/2)
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)Carles Farré
 
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)[DSBW Spring 2009] Unit 02: Web Technologies (1/2)
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)Carles Farré
 
[DSBW Spring 2009] Unit 01: Introducing Web Engineering
[DSBW Spring 2009] Unit 01: Introducing Web Engineering[DSBW Spring 2009] Unit 01: Introducing Web Engineering
[DSBW Spring 2009] Unit 01: Introducing Web EngineeringCarles Farré
 
[ABDO] Data Integration
[ABDO] Data Integration[ABDO] Data Integration
[ABDO] Data IntegrationCarles Farré
 
[ABDO] Logic As A Database Language
[ABDO] Logic As A Database Language[ABDO] Logic As A Database Language
[ABDO] Logic As A Database LanguageCarles Farré
 

Mehr von Carles Farré (17)

Aplicacions i serveis web (ASW)
Aplicacions i serveis web (ASW)Aplicacions i serveis web (ASW)
Aplicacions i serveis web (ASW)
 
DSBW Final Exam (Spring Sementer 2010)
DSBW Final Exam (Spring Sementer 2010)DSBW Final Exam (Spring Sementer 2010)
DSBW Final Exam (Spring Sementer 2010)
 
Web Usability (Slideshare Version)
Web Usability (Slideshare Version)Web Usability (Slideshare Version)
Web Usability (Slideshare Version)
 
[DSBW Spring 2010] Unit 10: XML and Web And beyond
[DSBW Spring 2010] Unit 10: XML and Web And beyond[DSBW Spring 2010] Unit 10: XML and Web And beyond
[DSBW Spring 2010] Unit 10: XML and Web And beyond
 
[DSBW Spring 2009] Unit 09: Web Testing
[DSBW Spring 2009] Unit 09: Web Testing[DSBW Spring 2009] Unit 09: Web Testing
[DSBW Spring 2009] Unit 09: Web Testing
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (3/3)
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (1/3)
 
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)
[DSBW Spring 2009] Unit 06: Conallen's Web Application Extension for UML (WAE2)
 
[DSBW Spring 2009] Unit 05: Web Architectures
[DSBW Spring 2009] Unit 05: Web Architectures[DSBW Spring 2009] Unit 05: Web Architectures
[DSBW Spring 2009] Unit 05: Web Architectures
 
[DSBW Spring 2009] Unit 04: From Requirements to the UX Model
[DSBW Spring 2009] Unit 04: From Requirements to the UX Model[DSBW Spring 2009] Unit 04: From Requirements to the UX Model
[DSBW Spring 2009] Unit 04: From Requirements to the UX Model
 
[DSBW Spring 2009] Unit 03: WebEng Process Models
[DSBW Spring 2009] Unit 03: WebEng Process Models[DSBW Spring 2009] Unit 03: WebEng Process Models
[DSBW Spring 2009] Unit 03: WebEng Process Models
 
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)[DSBW Spring 2009] Unit 02: Web Technologies (2/2)
[DSBW Spring 2009] Unit 02: Web Technologies (2/2)
 
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)[DSBW Spring 2009] Unit 02: Web Technologies (1/2)
[DSBW Spring 2009] Unit 02: Web Technologies (1/2)
 
[DSBW Spring 2009] Unit 01: Introducing Web Engineering
[DSBW Spring 2009] Unit 01: Introducing Web Engineering[DSBW Spring 2009] Unit 01: Introducing Web Engineering
[DSBW Spring 2009] Unit 01: Introducing Web Engineering
 
[ABDO] Data Integration
[ABDO] Data Integration[ABDO] Data Integration
[ABDO] Data Integration
 
[ABDO] Logic As A Database Language
[ABDO] Logic As A Database Language[ABDO] Logic As A Database Language
[ABDO] Logic As A Database Language
 

Kürzlich hochgeladen

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

[DSBW Spring 2009] Unit 08: WebApp Security

  • 1. Unit 8: Security for Web Applications  Security is fundamentally about protecting assets (data, hardware, reputation, etc.). Therefore you should Identify potential threats  Detect and fix vulnerabilities  Know how to react to an attack   A threat is any potential occurrence, malicious or otherwise, that could harm an asset.  A vulnerability is a weakness that makes a threat possible, due to poor design, configuration mistakes, and/or inappropriate and insecure coding techniques.  An attack is an action that exploits a vulnerability or enacts a threat. Examples:  sending malicious input to an application  flooding a network in an attempt to deny service. dsbw 2008/2009 2q 1
  • 2. Foundations of Security  Authentication (who are you?): the process of uniquely identifying the clients of your applications and services.  Authorization (what can you do?): the process that governs the resources and operations that the authenticated client is permitted to access.  Non-repudiation: guarantees that a user cannot deny performing an operation or initiating a transaction.  Confidentiality: the process of making sure that data remains private and confidential, and that it cannot be viewed by unauthorized people.  Integrity: the guarantee that data is protected from accidental or deliberate (malicious) modification.  Availability: systems remain available for legitimate users. dsbw 2008/2009 2q 2
  • 3. Main Threat Categories: STRIDE  Spoofing: Attempting to gain access to a system by using a false identity, eg. using stolen user credentials or a false IP address.  Tampering: Unauthorized modification of data, for example as it flows over a network between two computers.  Repudiation: The ability of users (legitimate or otherwise) to deny that they performed specific actions or transactions. Without adequate auditing, repudiation attacks are difficult to prove  Information disclosure: Unwanted exposure of private data.  Denial of service: The process of making a system or application unavailable.  Elevation of privilege: Occurs when a user with limited privileges assumes the identity of a privileged user to gain privileged access to an application. dsbw 2008/2009 2q 3
  • 4. STRIDE Countermeasures Use strong authentication. Spoofing user identity Do not store secrets (eg., passwords) in plaintext. Do not pass credentials in plaintext over the wire. Protect authentication cookies with SSL. Use data hashing and signing. Tampering with data Use digital signatures. Use tamper-resistant protocols Use protocols that provide message integrity. Create secure audit trails. Repudiation Use digital signatures. Use strong authorization. Information disclosure Use strong encryption. Use protocols that provide message confidentiality. Do not store secrets in plaintext. Use resource and bandwidth throttling techniques. Denial of service Validate and filter input. The principle of least privilege: use least privileged Elevation of privilege accounts to run processes and access resources. dsbw 2008/2009 2q 4
  • 5. Core Web Application Security Principles Compartmentalize Create different security boundaries, zones, with their own policies Use least privilege Run processes using accounts with minimal privileges and access rights Apply defense in depth Use multiple gatekeepers to keep attackers at bay, do not rely on a single layer of security Do not trust user input Assume all input is malicious until proven otherwise Authenticate and authorize callers early — at the first gate Check at the gate Fail securely If an application fails, do not leave sensitive data accessible. Return friendly errors to end users that do not expose internal system details. Secure the weakest Identify it, strengthen it, fix it link Create secure defaults Make default users/actions/authorizations set up with least privilege Reduce your attack Disable or remove unused services, protocols, and surface functionality. dsbw 2008/2009 2q 5
  • 6. Web Application Security: The Three-Tiered Approach dsbw 2008/2009 2q 6
  • 7. Integrating Security in the WebApp Process dsbw 2008/2009 2q 7
  • 8. The RACI Chart (Responsible, Accountable, Consulted, Kept Informed) System Security Tasks Architect Developer Tester Administrator Professional Security Policies R A Threat Modeling A I I R Security Design Principles A I I C Security Architecture A C R Architecture and Design R A Review Code Development A R Technology Specific Threats A R Code Review R I A Security Testing C I A C Network Security C R A Host Security C A I R Application Security C I A R Deployment Review C R I I A dsbw 2008/2009 2q 8
  • 9. Network Threats and Countermeasures Threat Description Countermeasure Information Port scanning and footprinting to Configure routers to restrict their Gathering detect device types and vulnerable responses to footprinting requests. operating systems and application Disable unused protocols and versions. unnecessary ports. Sniffing Monitoring traffic on the network for Use encrypted protocols (SSL, data such as plaintext passwords or IPSec) configuration information Hiding one’s true identity on the Spoofing Filter packets network by using fake source addresses Session Deceiving a server or a client into Use encrypted session negotiation Hijacking accepting the upstream host as the and communication channels. actual legitimate host Denial of Denying legitimate users access to a Increase the size of the TCP Service server or services, e.g by sending connection queue, decrease the more requests to a server than it can connection establishment period, handle (SYN flood attack) and employ dynamic backlog mechanisms. dsbw 2008/2009 2q 9
  • 10. Host Threats and Countermeasures Threat Description Countermeasure Viruses, Trojan horses, Updated service packs and and worms software patches Footprinting port scans, ping sweeps, and Disable unnecessary NetBIOS enumeration to protocols and ports glean valuable system-level information Password Cracking Use strong passwords, limit the number of retry attempts, do not use default account names Denial of Service Deviate traffic to other hosts Arbitrary Code Execution Executing malicious code on Lock down system your server by using buffer commands and utilities overflow attacks. Unauthorized Access Unauthorized access to Lock down files and folders restricted information or with restricted permissions. operations dsbw 2008/2009 2q 10
  • 11. Application Threats Category Threats Input validation Buffer overflow: cross-site scripting; SQL injection; canonicalization Authentication Network eavesdropping; brute force attacks; dictionary attacks; cookie replay; credential theft Authorization Elevation of privilege; disclosure of confidential data; data tampering; luring attacks Configuration Unauthorized access to administration interfaces; unauthorized access management to configuration stores; retrieval of clear text configuration data; lack of individual accountability; over-privileged process and service accounts Sensitive data Access sensitive data in storage; network eavesdropping; data tampering Session management Session hijacking; session replay; man in the middle Cryptography Poor key generation or key management; weak or custom encryption Parameter manipulation Query string manipulation; form field manipulation; cookie manipulation; HTTP header manipulation Exception management Information disclosure; denial of service Auditing and logging User denies performing an operation; attacker exploits an application without trace; attacker covers his or her tracks dsbw 2008/2009 2q 11
  • 12. Application Countermeasures Category Countermesures Input Validation Do not trust input; consider centralized input validation. Do not rely on client-side validation. Be careful with canonicalization issues. Constrain. reject, and sanitize input. Validate for type, length, format, and range. Authentication Partition site by anonymous, identified, and authenticated area. Use strong passwords. Support password expiration periods and account disablement. Do not store credentials (use one-way hashes with salt). Encrypt communication channels to protect authentication tokens. Pass Forms authentication cookies only over HTTPS connections. Authorization Use least privileged accounts. Consider authorization granularity. Enforce separation of privileges. Restrict user access to system-level resources. Configuration Use least privileged process and service accounts. Do not store Management credentials in plaintext. Use strong authentication and authorization on administration interfaces. Do not use the LSA. Secure the communication channel for remote administration. Avoid storing sensitive data in the Web space. Sensitive Data Avoid storing secrets. Encrypt sensitive data over the wire. Secure the communication channel. Provide strong access controls on sensitive data stores. Do not store sensitive data in persistent cookies. Do not pass sensitive data using the HTTP-GET protocol. dsbw 2008/2009 2q 12
  • 13. Application Countermeasures (cont.) Category Countermeasures Session Management Limit the session lifetime. Secure the channel. Encrypt the contents of authentication cookies. Protect session state from unauthorized access. Cryptography Do not develop your own. Use tried and tested platform features. Keep unencrypted data close to the algorithm. Use the right algorithm and key size. Avoid key management (use DPAPI). Cycle your keys periodically. Store keys in a restricted location. Parameter Manipulation Encrypt sensitive cookie state. Do not trust fields that the client can manipulate (query strings, form fields, cookies, or HTTP headers). Validate all values sent from the client. Exception Management Use structured exception handling. Do not reveal sensitive application implementation details. Do not log private data such as passwords. Consider a centralized exception management framework. Auditing and Logging Identify malicious behavior. Know what good traffic looks like. Audit and log activity through all of the application tiers. Secure access to log files. Back up and regularly analyze log files. dsbw 2008/2009 2q 13
  • 14. Web Application Security: Summary dsbw 2008/2009 2q 14
  • 15. Cryptography ―  The coding of messages so as to render them unintelligible to other than authorized recipients. Many techniques are known for the conversion of the original message, known as plaintext, into its ‖ encrypted form, known as ciphertext, cipher, or code Dictionary of Computing. Oxford University Press, 2004 dsbw 2008/2009 2q 15
  • 16. Roles for Cryptography  Authentication: Digital signatures can be used to identify a participant in a web transaction or the author of an email message  Authorization: Cryptographic techniques can be used to distribute a list of authorized users that is all but impossible to falsify.  Confidentiality: Encryption is used to scramble information sent over networks and stored on servers so that eavesdroppers cannot access the data's content  Integrity: Methods that are used to verify that a message has not been modified while in transit. Often, this is done with digitally signed message digest codes.  Nonrepudiation: Cryptographic receipts are created so that an author of a message cannot realistically deny sending a message dsbw 2008/2009 2q 16
  • 18. Public Key (aka Asymmetric) Cryptography dsbw 2008/2009 2q 18
  • 19. Authentication with Public Key Cryptography dsbw 2008/2009 2q 19
  • 21. Cryptography-based Internet Protocols  Virtual Private Networks (VPN) Internet Protocol Security (IPSEC)   Point-to-Point Tunneling Protocol (PPTP)  Layer Two Forwarding (L2F)  Layer Two Tunneling Protocol (L2TP)  E-mail Encryption Secure Multipurpose Internet Mail Extensions (S/MIME)   Pretty Good Privacy  WWW i e-commerce SSL/TSL   Secure Electronic Transaction (SET) dsbw 2008/2009 2q 21
  • 22. SSL/TSL  SSL – Secure Socket Layer  TLS – Transport Layer Security  Both provide a secure transport connection between clients and servers:  Authentication of the server, using digital signatures  Authentication of the client, using digital signatures  Data confidentiality through the use of encryption  Data integrity through the use of message authentication codes  History:  SSL was developed by Netscape  SSL version 3.0 has been widely used on the Internet  SSL evolved into TLS (RFC 2246)  TLS can be viewed as SSL v3.1 dsbw 2008/2009 2q 22
  • 23. SSL architecture SSL SSL Change SSL applications Handshake Cipher Spec Alert (e.g., HTTP) Protocol Protocol Protocol SSL Record Protocol TCP IP dsbw 2008/2009 2q 23
  • 24. SSL Components  SSL Record Protocol  fragmentation  compression  message authentication and integrity protection  encryption  SSL Handshake Protocol  negotiation of security algorithms and parameters  key exchange  server authentication and optionally client authentication  SSL Alert Protocol  error messages (fatal alerts and warnings)  SSL Change Cipher Spec Protocol  a single message that indicates the end of the SSL handshake dsbw 2008/2009 2q 24
  • 25. SSL sessions and connections  An SSL session is an association between a client and a server  SSL sessions are stateful: the session state includes security algorithms and parameters  A SSL session may include multiple secure connections between the same client and server  SSL sessions are used to avoid expensive negotiation of new security parameters for each connection dsbw 2008/2009 2q 25
  • 26. SSL Record Protocol: Processing application data fragmentation SSLPlaintext type version length compression SSLCompressed type version length msg authentication and encryption (with padding if necessary) SSLCiphertext type version length MAC padding dsbw 2008/2009 2q 26
  • 27. SSL Handshake Protocol client server client_hello Phase 1: Negotiation of the session ID, key exchange algorithm, MAC algorithm, encryption algorithm, and server_hello exchange of initial random numbers certificate Phase 2: Server may send its certificate and key server_key_exchange exchange message, and it may request the client to send a certificate. Server signals end of hello certificate_request phase. server_hello_done certificate Phase 3: Client sends certificate if requested and may client_key_exchange send an explicit certificate verification message. Client always sends its key exchange message. certificate_verify change_cipher_spec finished Phase 4: Change cipher spec and finish handshake change_cipher_spec finished dsbw 2008/2009 2q 27
  • 28. References  http://www.w3.org/Security/Faq/www-security-faq.html  Web Security, Privacy & Commerce, 2nd Edition, by Simson Garfinkle with Gene Spafford, O'Reilly, 2001.  Improving Web Application Security: Threats and Countermeasures, by Microsoft Corporation, Microsoft Press, 2003 dsbw 2008/2009 2q 28