WS Unit 2 Notes
WS Unit 2 Notes
UNIT – 2
Topic – 1
"The Web’s War on Your Privacy" is a compelling phrase that points to the ongoing challenges individuals
face in maintaining their personal privacy while using the internet. Over the past couple of decades, the web
has become an increasingly complex ecosystem where personal data is not just stored, but actively harvested,
tracked, and monetized. This often happens without users fully understanding the implications of their online
behavior.
The war on privacy can be broken down into several key elements:
1. Surveillance Capitalism
At the heart of the issue is the rise of "surveillance capitalism," a term coined by Shoshana Zuboff. It refers
to the business model where companies—primarily tech giants like Google, Facebook, and Amazon—collect
and exploit users' personal data for profit. This data is often used to target advertisements, create user
profiles, and even influence decisions at an individual or societal level.
Companies can gather vast amounts of information from seemingly innocuous activities, such as:
Cookies are small pieces of data that websites store in your browser. While they're often used to enhance user
experience by remembering logins, language preferences, and shopping cart contents, they also allow
websites to track your activity across the web. This means that advertisers can follow you from one site to
another, creating a detailed profile based on your behavior.
Other tracking technologies, like web beacons and fingerprinting, further amplify this monitoring. Web
beacons are often invisible images embedded in websites or emails that can track your actions, and
fingerprinting refers to the unique combination of your device’s characteristics (like screen size, browser
type, and IP address) to identify and track you, even if you clear your cookies.
3. Data Brokers
Behind the scenes, data brokers collect, buy, and sell your personal information. They aggregate data from
various sources—public records, social media profiles, transaction histories—and sell this data to marketers,
political campaigns, and other businesses. Even if you're not using social media or don't realize it, your data
could still be sold or used to target you.
Privacy policies and terms of service are often long and difficult to understand, leading many users to
unknowingly agree to give up significant amounts of personal data. Even with privacy settings adjusted,
companies may still have access to considerable amounts of user data.
5. Government Surveillance
While tech companies are often in the spotlight for their role in eroding privacy, governments around the
world have also become active players in surveillance. Laws such as the Patriot Act in the United States and
similar legislation in other countries give governments broad powers to collect data on their citizens. This
includes monitoring internet activity, phone calls, and even location data.
Additionally, with the rise of artificial intelligence and machine learning, the capabilities of surveillance tools
have expanded exponentially, making it easier for governments to track and predict citizens' movements and
behaviors.
Most people are aware that online services often require sacrificing privacy for convenience. Social media
platforms, cloud services, and free apps might be tempting due to their ease of use, but many of these
services rely on collecting and monetizing data. Users are often asked to trade their data in exchange for a
"free" service, leading to a paradox: many people feel that the convenience of online tools outweighs the
potential risks to their privacy.
Amid growing concerns about privacy, there has also been a push for stronger encryption and privacy-
focused technologies. Tools like VPNs (Virtual Private Networks), end-to-end encrypted messaging
services (e.g., Signal, WhatsApp), and privacy-focused browsers (e.g., Tor and Brave) give users more
control over their data and online footprint. However, even with these tools, privacy can never be fully
guaranteed, as governments and corporations continue to find new ways to monitor or bypass these
protections.
Over the past decade, there have been significant legal efforts to address the privacy issue. For example:
The General Data Protection Regulation (GDPR) in the European Union has set new standards for
how companies handle user data, with a focus on consent and transparency.
The California Consumer Privacy Act (CCPA) offers similar protections for residents of
California.
Various right to be forgotten rulings and legal challenges have sparked debates about the extent to
which individuals can control their personal information.
Despite these efforts, privacy advocates argue that laws are often too slow to keep up with the rapid pace of
technological innovation and corporate practices.
9. What Can You Do?
There are steps that individuals can take to protect their privacy online:
-----------------------------------------------------------------------------------------------------------------
Topic – 2
Privacy-Protecting Techniques
Privacy-protecting techniques are essential for safeguarding personal information and maintaining
confidentiality in the digital age. With the increasing amount of data being collected by companies,
governments, and other entities, employing privacy-enhancing methods is crucial. Below are some widely-
used privacy-protecting techniques:
1. Encryption
Description: Encryption is the process of converting data into a code to prevent unauthorized access.
This is one of the most effective techniques for protecting data both in transit (while being sent over
networks) and at rest (when stored).
Examples:
o End-to-End Encryption: Used in messaging apps like WhatsApp, where only the sender and
receiver can read the messages.
o Full Disk Encryption (FDE): Encrypting the entire hard drive of a computer or mobile
device to protect data in case the device is lost or stolen.
Description: These techniques are used to protect the identity of individuals in datasets.
o Anonymization removes all personally identifiable information (PII) from data, ensuring it
cannot be traced back to an individual.
o Pseudonymization replaces identifiable data with pseudonyms or codes, allowing data to be
re-identified under certain circumstances (e.g., through authorized access).
Use Cases: Data shared for research or analytics, where it’s important to analyze trends without
revealing personal details.
Description: A cryptographic method that allows one party to prove to another party that they know
a value (like a password or a secret) without actually revealing the value itself.
Use Case: Zero-knowledge proofs are used in blockchain technologies and privacy-focused systems
to authenticate users without revealing sensitive data, such as in cryptocurrencies like Zcash.
4. Differential Privacy
Description: A statistical technique used to ensure that the privacy of individuals is maintained while
allowing data analysis. It adds noise (random data) to datasets in such a way that individual data
points cannot be isolated.
Use Case: Used by companies like Apple and Google in their data collection methods, where
aggregated data can be analyzed without compromising individual privacy.
5. Data Minimization
Description: The principle of only collecting and retaining the minimum amount of personal data
necessary to fulfill a particular purpose.
Use Case: This is a core principle in privacy laws like the GDPR (General Data Protection
Regulation) and helps limit the exposure of personal information.
Description: A VPN encrypts your internet connection and routes it through a secure server, masking
your IP address and preventing third parties from tracking your online activities.
Use Case: VPNs are commonly used for secure browsing on public Wi-Fi networks, maintaining
anonymity online, and bypassing geo-restrictions.
Description: Tor is a privacy-focused network that routes internet traffic through multiple servers to
anonymize users. It’s often used to access the "dark web" but is also widely used for general
anonymous browsing.
Use Case: Protecting user identity and activity while browsing the web, especially for journalists,
activists, and anyone needing to avoid surveillance.
Description: A cryptographic technique that allows multiple parties to jointly compute a function
over their inputs while keeping those inputs private.
Use Case: Used in collaborative data analysis and sharing, where multiple organizations need to
process data together without revealing their sensitive inputs to each other.
Description: A security mechanism that requires two forms of authentication: something you know
(like a password) and something you have (like a phone or hardware token).
Use Case: Strengthening login security to prevent unauthorized access to accounts or systems.
Description: Modern browsers have built-in privacy features like cookie blocking, tracking
protection, and private/incognito browsing modes.
Use Cases:
o Tracking Prevention: Blocking third-party cookies and trackers to protect user privacy while
browsing.
o Private Browsing: Prevents the browser from saving history, cookies, and cached files during
the session.
Description: These search engines do not track or store personal data from users.
Examples:
o DuckDuckGo: A search engine that prioritizes privacy and doesn't track user searches.
o StartPage: A search engine that provides Google search results while protecting user privacy.
Description: Under privacy regulations like the GDPR, individuals can request access to the data
organizations hold on them, ask for it to be corrected, or demand it to be deleted.
Use Case: Giving users more control over their personal data and how it’s used.
Description: Tools that provide end-to-end encrypted messaging, voice, and video calls.
Examples: Signal, WhatsApp, and Threema are popular tools for secure communication.
Description: This involves limiting access to personal data based on user roles and permissions to
reduce the risk of unauthorized access.
Use Case: Ensuring that only authorized personnel can access sensitive personal data in
organizations.
Description: Regularly backing up data and ensuring it is securely stored is critical for protecting
against data loss, corruption, or malicious attacks.
Use Case: Preventing the loss of sensitive data during a ransomware attack, system failure, or
hardware malfunction.
Description: Data masking involves altering sensitive information to hide its true value while
maintaining its usability for testing or development purposes.
Use Case: Used in development environments where real customer data needs to be obfuscated to
prevent unauthorized access.
Description: Machine learning models can be trained on encrypted data using techniques such as
homomorphic encryption, which allows computations to be done on encrypted data without
decrypting it.
Use Case: AI applications in healthcare, finance, or other sensitive industries where data privacy
must be maintained during model training.
Topic – 3
Backups and anti-theft strategies are critical for protecting personal and organizational data against loss,
corruption, or unauthorized access. These techniques help ensure that data is recoverable in case of hardware
failure, ransomware attacks, theft, or other catastrophic events.
1. Backups
Backups are copies of your data stored separately from the original location. The main goal is to ensure that
you can recover your data if the primary source becomes corrupted, lost, or compromised. Here are key
backup strategies:
Backup Strategies:
Regularly Test Backups: Ensure your backups can be restored properly and frequently test recovery
procedures.
Version Control: Retain several versions of backups to protect against data corruption or accidental deletion.
Off-site Backups: Regularly back up data to remote locations, either via cloud services or physical storage
that’s kept in a separate location from your main devices.
2. Anti-Theft Strategies
Anti-theft strategies focus on protecting devices (laptops, smartphones, etc.) from being stolen or
compromised, as well as securing the data on those devices. The goal is to make theft less likely, and if it
does happen, to ensure that the data remains secure.
Laptop Locks: Use physical locks (e.g., Kensington locks) to secure laptops to desks or other immovable
objects in public or shared spaces.
Anti-Theft Backpack or Briefcase: Invest in bags with anti-theft features like lockable zippers, RFID-blocking
compartments, or cut-resistant straps.
Device Identification Tags: Tag devices with identification numbers or custom labels, making them more
identifiable if stolen.
Remote Wipe: Enable features like Find My iPhone or Find My Device to remotely wipe the contents of a
smartphone if it is lost or stolen.
Lock Screen Settings: Set up automatic screen locking after a short period of inactivity to prevent
unauthorized access to your device.
SIM Card Lock: Enable a SIM card PIN to prevent unauthorized users from accessing the mobile network and
making calls or using data if the device is stolen.
Cloud and Account Security:
Secure Cloud Storage: Use services that offer end-to-end encryption (e.g., Tresorit, Sync.com) to protect
sensitive files from unauthorized access in the event of device theft.
Change Passwords Immediately: If a device with sensitive information is stolen, change passwords and
disable accounts as soon as possible to mitigate further damage.
Account Recovery Procedures: Set up alternative contact methods (such as a backup email or phone
number) for account recovery to help regain access if your accounts are compromised.
Cloud Backups: Regularly back up critical data to cloud storage services. This ensures that even if your device
is stolen, your important data will not be lost.
Offline Backups: Keep a copy of important documents on external drives or physical media that are stored
separately from the device.
To maximize security, consider combining both backup and anti-theft strategies. Here’s how:
Regularly Back Up Critical Data: Ensure that all critical information is backed up either to cloud storage or
external drives. This way, if your device is stolen, you won’t lose your data.
Use Encryption on All Devices: Encrypt all devices that store sensitive information, so even if the device is
stolen, the data is unreadable.
Enable Remote Wiping and Tracking: Use tracking tools like Find My Device and enable remote data wiping
to erase data if your device is lost or stolen.
Two-Factor Authentication (2FA) and Strong Passwords: Always enable 2FA on important accounts and use
complex passwords to prevent unauthorized access, even if your device is compromised.
-----------------------------------------------------------------------------------------------------------------
Topic – 4
Web Server Security is a crucial aspect of securing web applications and protecting sensitive data. Web
servers are the backbone of most online services and are constantly exposed to a variety of threats, from
hacking attempts to denial-of-service (DoS) attacks. Proper web server security ensures that the data
processed and served by the web server is protected from unauthorized access, alteration, or disruption.
Here’s a breakdown of key practices, strategies, and techniques for securing a web server:
Description: Regular updates to the web server software, operating system, and any applications it
runs are vital for preventing exploits from unpatched vulnerabilities.
Best Practices:
o Set up automatic updates or a regular schedule to check for and apply patches.
o Monitor security bulletins for the specific web server and any associated software (e.g., PHP,
MySQL, CMS platforms like WordPress, etc.).
o Use package managers to install and manage dependencies, ensuring they’re up to date.
2. Use Firewalls and Network Segmentation
Description: Secure communication between the web server and users is essential. SSL/TLS
encryption ensures that data transmitted over the network is secure and not susceptible to man-in-the-
middle (MITM) attacks.
Best Practices:
o Use TLS (Transport Layer Security) instead of SSL (SSL is outdated and insecure).
o Always use HTTPS to ensure secure connections by installing and configuring SSL/TLS
certificates on the web server.
o Use HSTS (HTTP Strict Transport Security) headers to enforce the use of HTTPS.
o Automated SSL Certificates: Use services like Let’s Encrypt to automate the SSL/TLS
certificate issuance and renewal process.
9. DDoS Protection
Regular Backups:
o Regularly back up your web server configurations, databases, and other critical files.
o Store backups securely and ensure that they are encrypted and kept off-site to protect against
data loss in case of a breach.
Test Backups:
o Periodically test your disaster recovery procedures to ensure you can restore from backups in
the event of an attack or system failure.
--------------------------------------------------------------------------------------------------
Topic – 5
Physical security for servers is an essential aspect of an organization's overall security strategy. While
digital protections like firewalls, encryption, and access controls are important, ensuring the physical security
of your server hardware is just as critical to preventing unauthorized access, theft, tampering, and natural
disasters. Physical security focuses on safeguarding the actual servers, data centers, and the infrastructure that
supports them. Here are key physical security measures to protect servers:
Location Selection:
o If possible, choose a location for your server room or data center that is less susceptible to
external threats (e.g., flooding, earthquakes, fires).
o Avoid placing servers in publicly accessible areas or on ground floors where they can be more
easily accessed.
o Separation from Non-Critical Infrastructure: Ensure that the server room is physically
separated from areas that are not critical to operations, reducing the risk of accidental or
unauthorized access.
Environmental Protection:
o Use raised floors to prevent water damage from floods or leaks.
o Install waterproof barriers and ensure that there’s no risk of water entering from external
sources like sprinklers, pipes, or external floods.
o Fireproofing: Choose fire-resistant building materials and install fire detection and
suppression systems (e.g., FM-200, Inergen, or CO2-based systems) that protect against
fire without damaging sensitive electronic equipment.
4. Environmental Monitoring
CCTV Cameras:
o Install high-resolution cameras to monitor the physical security of server rooms and data
centers. These should cover entrances, exits, and any sensitive areas.
o Use motion-detecting cameras for after-hours surveillance.
o Retain video footage for a reasonable duration and ensure that it is regularly monitored.
Access Logs and Alarms:
o Use digital access control logs to record who enters and exits the server area. These logs
should be stored securely and be monitored.
o Intrusion Detection Systems (IDS): Use physical intrusion alarms that alert staff to
unauthorized entry attempts into the server room or data center.
Staff Awareness:
o Train all relevant personnel on the importance of physical security and how they can help
secure the server room, report suspicious activity, and follow access protocols.
o Provide clear instructions on emergency procedures (e.g., evacuations, fire drills, lockdown
procedures).
Physical Lockdown:
o If necessary (e.g., during periods of high security risk), implement a physical lockdown of the
server room, ensuring that only authorized individuals have access during specific times.
Server Tamper Detection:
o Install tamper-evident seals or sensors that can notify administrators if equipment has been
moved, opened, or tampered with.
-------------------------------------------------------------------------------------------------------------
Topic – 6
Host Security for servers is a critical component of an organization’s overall cybersecurity posture. It
involves securing the physical server hardware, the operating system (OS), and all software running on the
server. Host security aims to protect the server from unauthorized access, malware, and other threats, as well
as ensure its reliability, integrity, and performance. Here’s a breakdown of key principles and best practices
for securing a server host:
1. Operating System Hardening
Description: Hardening the server’s operating system is crucial for minimizing vulnerabilities and reducing
the attack surface.
Best Practices:
Minimal Installation:
o Install only the necessary components and services required for the server’s role (e.g., a web
server, database server). Disable or uninstall any unused software or services to reduce
potential attack vectors.
Patch Management:
o Regularly update the server's OS and installed software to patch known vulnerabilities. Apply
patches and security updates promptly, especially critical security patches.
o Use a patch management tool to automate and centralize updates where possible (e.g., WSUS
for Windows or Unattended Upgrades for Linux).
Security Updates:
o Set the server to automatically install security updates if possible, but ensure manual
verification for major updates.
File Integrity Monitoring:
o Use tools like AIDE (Advanced Intrusion Detection Environment) or OSSEC to monitor
for unauthorized changes to system files and critical directories.
Description: Controlling access to the server and enforcing user management policies is fundamental to host
security.
Best Practices:
Description: Protecting the server from unauthorized network access is critical to avoid exploitation and data
breaches.
Best Practices:
Firewalls:
o Use a host-based firewall (e.g., iptables on Linux, Windows Firewall on Windows) to
control inbound and outbound traffic to and from the server.
o Restrict access to only the necessary ports and services (e.g., allow HTTP/HTTPS traffic for a
web server, block others).
Network Segmentation:
o Place sensitive servers in isolated network segments or virtual local area networks (VLANs),
separated from public-facing systems.
VPN and Encrypted Connections:
o Use a VPN (Virtual Private Network) for secure remote access and ensure that all traffic is
encrypted, particularly when managing servers from remote locations.
o Enforce TLS (Transport Layer Security) for any service that handles sensitive data (e.g., web
servers, databases).
Intrusion Detection/Prevention Systems (IDS/IPS):
o Deploy an IDS/IPS (e.g., Snort, Suricata) to monitor network traffic for suspicious activity
and block known threats.
Port Scanning:
o Regularly perform port scans on the server to identify open ports and unnecessary services
that could be exploited.
o Tools like Nmap or Netcat can help identify vulnerabilities.
Description: Securing remote access to servers is a key area for preventing unauthorized access, especially
in cloud or multi-tenant environments.
Best Practices:
SSH Configuration:
o For Linux-based servers, configure SSH securely by:
Changing the default SSH port (22) to a non-standard port.
Disabling root login via SSH (PermitRootLogin no).
Using public key authentication instead of password authentication.
Enabling SSH logging to monitor login attempts and connections.
Remote Desktop Protocol (RDP) Security:
o For Windows servers, configure RDP with strong access controls, such as:
Enabling Network Level Authentication (NLA).
Restricting RDP access using firewall rules to specific IP addresses.
Using RDP Gateway for additional security.
Two-Factor Authentication (2FA):
o Enable 2FA for accessing the server, especially for administrative or privileged accounts.
VPNs and Bastion Hosts:
o Use VPNs or bastion hosts as a secure gateway for remote access instead of directly exposing
the server to the internet.
5. Log Management and Monitoring
Description: Continuous monitoring and logging are necessary to detect unauthorized activities and system
anomalies in real-time.
Best Practices:
Centralized Logging:
o Use centralized logging solutions (e.g., ELK stack, Graylog, Splunk) to aggregate logs from
the server for easier analysis and monitoring.
Audit Logs:
o Enable audit logging to capture key security events, such as user logins, file access, and
configuration changes.
o On Linux, tools like auditd can track and log system calls and user activities.
Log Rotation and Retention:
o Set up log rotation policies to avoid logs from consuming excessive disk space. Ensure logs
are retained for a reasonable period for forensic analysis.
Real-Time Monitoring:
o Implement real-time monitoring tools (e.g., Nagios, Zabbix, Prometheus) to track server
performance, security events, and system health.
6. Malware Protection
Description: Protecting the server from malware and unauthorized software installations is crucial to
maintain host integrity.
Best Practices:
Antivirus/Antimalware Software:
o Install reputable antivirus/antimalware software (e.g., ClamAV, Sophos, Windows
Defender) to scan and detect known malicious files.
o Set up automatic scans and real-time protection to identify malware as soon as it enters the
system.
Rootkit Detection:
o Use tools like chkrootkit or rkhunter on Linux servers to detect rootkits and other types of
malware.
File Integrity Checkers:
o Implement file integrity checkers (e.g., AIDE, Tripwire) to monitor system files for
unauthorized changes.
7. Encryption
Description: Encryption ensures that sensitive data is protected both at rest (on disk) and in transit (over the
network).
Best Practices:
Disk Encryption:
o Use full disk encryption (e.g., LUKS on Linux, BitLocker on Windows) to encrypt data
stored on the server, making it inaccessible to unauthorized users.
Encrypt Sensitive Data in Transit:
o Use TLS/SSL for all communication between the server and clients, such as web traffic or
database connections.
o Ensure that weak ciphers and SSL versions are disabled to protect against encryption
vulnerabilities.
Encrypt Backups:
o Ensure that backup files are encrypted, both during transit and at rest.
Description: Regular backups are vital for ensuring business continuity in case of server failure, data
corruption, or breach.
Best Practices:
Regular Backups:
o Implement an automated backup schedule for critical data and configurations (e.g., using
rsync, Veeam, Acronis).
Offsite Backup Storage:
o Store backups offsite or in the cloud to ensure redundancy in case of physical damage to the
server or facility.
Backup Encryption:
o Encrypt backup files to ensure they remain secure if intercepted.
Test Backups Regularly:
o Test the backup restoration process periodically to ensure data can be recovered promptly in
case of disaster.
Description: Regular security audits and penetration tests identify weaknesses in the server's defenses.
Best Practices:
Vulnerability Scanning:
o Use vulnerability scanning tools (e.g., Nessus, OpenVAS) to regularly scan the server for
known vulnerabilities.
Penetration Testing:
o Hire external penetration testers or conduct internal red team exercises to simulate attacks and
uncover potential weaknesses.
Compliance Audits:
o Regularly check server configurations
------------------------------------------------------------------------------------------------------------
Topic – 7
Securing Web Applications is an essential part of an organization's cybersecurity strategy. Web applications
are often the target of cyberattacks because they are publicly accessible and can expose sensitive data or
business logic vulnerabilities. Ensuring web application security involves implementing measures across the
entire development lifecycle — from design and coding to deployment and ongoing maintenance. The goal is
to prevent attacks such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF),
and Denial of Service (DoS), among others.
php
Copy code
$stmt = $pdo->prepare("SELECT * FROM users WHERE username = :username");
$stmt->execute(['username' => $username]);
What is XSS?
o XSS attacks occur when attackers inject malicious scripts into webpages viewed by other
users. This can steal session cookies, redirect users, or deface the application.
Prevent XSS:
o Escape Output: Always escape data before rendering it in the browser. Use libraries or built-
in frameworks to prevent malicious scripts from executing (e.g., OWASP ESAPI, Java’s
OWASP Java Encoder, or JavaScript’s escape() function).
o Context-Sensitive Encoding: Properly encode data depending on the context in which it’s
used (HTML, JavaScript, URL, etc.). This prevents browser execution of malicious code.
o Content Security Policy (CSP): Implement CSP headers to mitigate XSS by restricting the
sources from which content (e.g., scripts) can be loaded.
What is CSRF?
o CSRF attacks exploit the trust that a site has in the user's browser, making an authenticated
user perform unwanted actions without their consent (e.g., changing account settings,
submitting forms).
Prevent CSRF:
o Use anti-CSRF tokens. These are unique, unpredictable tokens embedded in forms or HTTP
headers and verified on the server side before accepting requests.
o For example, in PHP, you can generate a CSRF token for each form:
php
Copy code
$_SESSION['csrf_token'] = bin2hex(random_bytes(32));
o SameSite Cookies: Use the SameSite cookie attribute to prevent cross-site requests by
default. This helps block cookies from being sent in cross-origin requests.
o Enable CORS (Cross-Origin Resource Sharing) policies on the server to limit which
domains can interact with your web app.
Secure Authentication:
o Use strong password policies (e.g., at least 12 characters, mixed character types) and
encourage users to set strong, unique passwords.
o Multi-Factor Authentication (MFA): Enforce MFA for all sensitive accounts, including
administrators and users with access to critical features or data. Use methods like SMS-based
tokens, authentication apps (Google Authenticator), or hardware tokens.
o OAuth and OpenID Connect: Use standards like OAuth 2.0 and OpenID Connect for
secure, token-based authentication, especially for integrating with third-party identity
providers (e.g., Google, Facebook).
Session Management:
o Use secure, HTTP-only cookies for storing session tokens. This ensures that session tokens
cannot be accessed via JavaScript, mitigating XSS risks.
o Set the SameSite attribute for session cookies to Strict or Lax to reduce the risk of cross-
origin attacks.
o Implement session expiration and automatic logout after a period of inactivity. Regularly
regenerate session IDs after successful login to prevent session fixation attacks.
o Logout Mechanisms: Provide users with a clear way to log out, ensuring that all associated
sessions are terminated.
7. Security Headers
Security Audits:
o Conduct regular security audits to identify and fix vulnerabilities in your web application.
This includes reviewing your application’s code, configuration, and infrastructure.
Penetration Testing:
o Perform penetration testing (either internally or through third-party security experts) to
simulate real-world attacks and identify security weaknesses.
o Regularly test for vulnerabilities such as SQL injection, XSS, CSRF, and others listed in the
OWASP Top Ten.