0% found this document useful (0 votes)
25 views8 pages

Web Application Security

The document outlines the fundamentals of web application security (WAS), detailing its purpose, common attacks, and essential tools. It provides a historical overview of software security evolution from early computing to the present, highlighting significant threats and the emergence of ethical hacking. Key concepts such as secure coding practices, encryption, and the importance of security assessments are emphasized throughout the document.

Uploaded by

ajayrajay790
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views8 pages

Web Application Security

The document outlines the fundamentals of web application security (WAS), detailing its purpose, common attacks, and essential tools. It provides a historical overview of software security evolution from early computing to the present, highlighting significant threats and the emergence of ethical hacking. Key concepts such as secure coding practices, encryption, and the importance of security assessments are emphasized throughout the document.

Uploaded by

ajayrajay790
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

NAVEEN CEO OF INDIA

UNIT 1

1. WEB APPLICATION SECURITY (WAS) OR SECURING :


PROTECTS (OR) SAFEGUARD WEBSITES AND APPLICATIONS FROM CYBERSATTACK (OR)
VULNERABILITIES .

WORKS:

 DEVELOPMENT
 TESTING
 CONTROLS
 INPUT VALIDATION
 ENCRYPTION
 AUDIT OR LOGGING
1. DEVELOPMENT
 USE SECURE CODING AND DESIGN TO AVOID VULNERABILITIES .
2. TESTING
 RUN TEST THROUGHOUT DEVELOPMENT TO FIND BUGS AND CONFIGURATION .
3. CONTROLS
 USE FIREWALLS AND CONTROLS TO PREVENT UNAUTHORIZED ACCESS
4. INPUT VALIDATION
 TO PREVENT USER INPUT FROM MALICIOUS THREAT .
5. ENCRYPTION
 PROTECT DATA INTRANSIT
6. AUDIT AND LOGGING
 KEEP TRACK OF USER ACTIVITY TO HELP IDENTIFY AND RESPOND TO OTHERS.
COMMON WEB APPLICATION ATTACKS :

 BRUTE FORCE
 CREDENTIAL STUFFING
 SQL INJECTION
 ERROR WITH SCRIPTING
 COOKIES
 POISIONING
 SESSION HIJACKING

TOOLS:

WAF(WEB APPLICATION FIREWALL )

SPECTRAL

RUNTIME APPLICATION SELF PROTECTION

FUNDAMENTALS OF WAS (OR) KEY CONCEPT OF WAS :


1. AUTHENTICATION
2. AUTHORIZATION
3. INPUT VALIDATION
4. SECURING CODING PRACTICES
5. ENCRYPTION
6. ACCESS CONTROL
7. LOGGING
8. MONETARY
9. REGULAR CACHE
10. PRINCIPAL OF
11. VULNERABILITY MANAGEMENT
12. PERFORMING SECURITY ASSESSMENT
HISTORY OF SOFTWARE SECURITY:
 IT IS A LONG AND EVOLVING STRONG SHAPE BY THE INCREASING COMPLEXITY OF COMPUTER
SYSTEM, THE RAISE OF THE INTERNET & THE NEED TO SAFEGUARD DIGITAL ASSESTS.

EARLY COMPUTING [1940-1960]:

o FIRST COMPUTER SECURITY CONCEPT :

 EARLY COMPUTING WAS PRIMARILY FOCUSED ON SOLVING MATHEMATICAL AND


SCIENTIFIC PROBLEMS .
 IN 1960’S IBM MAINFRAME STARTED BEING USED FOR BUSINESS .

APPLICATION : BASIC
 SECURITY CONCEPT LIKE PASSWORD AND ACCESS CONTROL MECHANISMS.

2.THE RISE OF PASSWORD :(1970’S) :


 ONE OF THE EARLIEST SECURITY SYSTEMS DESIGNED FOR A MULTIPLE USER ENVIRONMENT .
 UNIX SECURITY :
 AS UNIX GAINED 1970’S AND 1980’S FILE PERMISSIONS AND PASSWORD PROTECTION, WERE
INTEGRAL PART OF THE SYSTEM .

SECURITY DESIGN :
 THE BIRTH OF FIRST VIRUSES :
o IN THE EARLY 1970’S
o THE CONCEPT OF COMPUTER VIRUSES BEGAN TO EMERGE .

EXAMPLE: CREEPER VIRUSES .

3.THE ADVENT OF PUBLIC NETWORKS (1980’S):

ARPANET AND NETWORDED SECURITY :


 FIRST TIME THAT MULTIPLE COMPUTER’S WERE CONNECTED IN A NETWORKED ENVIRONMENT
ALLOW FOR REMOTE ACCESS AND VULNERABILITY .

THE MORIS WORM (1988):


 SELF REPLICATING MALWARE THAT CAUSED SIGNIFICANT DISRUPTION ACROSS THE ARPANET.

INTRODUCTION OF FIREWALLS :

AS THE NEED FOR NETWORK SECURITY INCREASED , THE CONCEPT OF FIREWALLS


MERGED TO PROTECT PRIVATE NETWORK FROM UNAUTHORIZED ACCESS.

THE 1990’S THE WEB AND HIJACKING CULUTURE EMERGES :

THE RISE OF THE WORLD WIDE WEB :

AS THE WEB BEGAN TO GAIN TRACTION, SOFTWARE VULNERABILITIES BECAME,MARE


PUBLICLY RECOGNIZED .
WEB SECURITY BECAME A SIGNIFICANT FOCUS WITH THE DEVELOPMENT OF BROWSER
BASED THREATS .

THE FIRST MAJOR MALWARE (1990’S):

 DURING THIS PERIOD , MARE SOPHISTICATED FROMS OF MALWARE INCLUDING


TROJANS ,WORMS AND VIRUS STARTED TO SPREAD RAPIDLY .

THE LOVE BUG VIRUSES (2000’S):

 FOR INSTANCE INFECTED MILLIONS OF COMPUTERS THROUGH EMAIL.

ETHICAL HACKING AND HACKER CULTURE :

 THE 1990’S SAW THE RISE OF A MORE ORGANIZED HACKER CULTURE


 INDIVIDUALS AND GROUPS STARTED TO EXPLOIT VULNERABILITIES FOR BOTH MALICIOUS
PURPOSES AND TO TEST AND IMPROVE SYSTEM SECURITY .
 ETHICAL HACKING ALSO EMERGED AS A PROFESSION .DURING THIS TIME,WHERE SECURITY
PROFESSIONALS WOULD ATTEMPT TO FIND VULNERABILITIES BEFORE MALICIOUS HACKERS
COULD .

VULNERABILITIES AND EXPLOITS:

o MANY ATTACK SUCH AS SQL INJECTION AND CROSS-SIDE SCRIPTING (XSS) WERE FIRST
RECOGNIZED IN THE 1990’S.
o THE WIDESPREAD USE OF THE INTERNET LED TO MORE SYSTEMATIC IDENTIFICATION OF
SECURITY FLOWS IN WEB APPLICATION .

THE 2000’S :THE GROWING IMPORTANCE SOFTWARE SECURITY :

THE CONCEPT OF SOFTWARE ASSURANCE :

 SOFTWARE ASSURANCE EMERGED AS AN ESSENTIAL CONCEPT, EMPHASSING THE SECURE


DESIGN, CODING AND MAINTENANCE OF APPLICATION .

WIDE SPREAD CYBER SECURITY THREATS:

ATTACKS PHISHING DENIAL OF SERVICE ATTACKS AND SPYWARE BECAME MORE COMMON AND
ORGANIZATION STARTED INVESTING MORE HEAVILY IN CYBER SECURITY TECHNOLOGIES .
ANTIVIRUS SOFTWARE AND INCLUSION DEDUCTION SYSTEM BECAME STAPLES IN ENTERPRISE
ENVIRONMENT .

BUFFER OVERFLOW ATTACKS :

o THE EXPLOITATION OF SUCH VULNERABILITIES LED TO SIGNIFICANT WAS WRITTEN WITH


DEVELOPERS STARTING TO ADOPT MORE SECURE CODING PRACTICES .

THE 2010’S CLOUD COMPUTING ,MOBILE APPS AND ADVANCED THREATS .


MOBILE SECURITY :

 THE RAPID ADOPTION OF SMART PHONES AND MOBILE APPLICATION INTRODUCED . NEW
ATTACK VECTORS SUCH AS MOBILE MALWARE AND PRIVACY CONCERNS RELATED TO
PERMISSION .
 SECURE DEVELOPMENT PRACTICE FOR MOBILE APPS,INCLUDING DATA ENCRYPTION AND APP
SAND BOXING BECAME CRITICAL.

CLOUD SECURITY :

 NEW CHALEENGES EMERGED AROUND SCARING CLOUD INFRASTRUCTURE ,DATA STORAGE


AND MULITITALENT ENVIRONMENT .
 IDENTITY AND I AM ALONG WITH ENCRYPTION BECAME CENTRAL TO CLOUD COMPUTING .
THE 2020’S :AI ZERO TRUST AND NEXT GENERATION THREATS :
ZERO TRUST ARCHITECTURE :

 THE ZERO TRUST SECURITY MODEL WERE KNOWN ENTITY TRUSTED BY DEFAULT .
 SUPPLY CHAIN ATTACKS LIFE SOL OR WIND HACK 2020 DEMONSTRATOR THE VULNERABILITIES
OF THE SOFTWARE SUPPORT CHAIN WHERE HACKERS TARGETER SOFTWARE VENDORS TO GAIN
ACCESS TO THEY CUSTOMERS NETWORKS .

PRIVACY REGULATION :

 WITH GROWING CO NCERN OVER USER PRIMARY REGULATION LIKE GDPR MN0PR (GENERAL
DATA PRODUCTION REGULATION ) IN THE YEAR 2018. AND CCPA (CALIFORNIA CONSUMER
PRIVATE ATTACK) .AT CALIFORNIA CONSUMER PRIVACY HACK BEGAN TO STRICT REQUIREMENT
FOR SECURING PERSONAL DATA .ONGOING TRENDS AND CHALLENGES. THE INTEGRATION
SECURITY PRACTICES INTO DEPARTMENT PIPELINE IS BECOMING INCREASING THE IMPORTANT .
MOMENT ENSURE THAT SECURITY IS THAT PART OF DEVELOP AND DEPLOYMENT LIFE CYCLE.

You might also like