Cyber Security Unit 2 Notes
Cyber Security Unit 2 Notes
(Unit II)
Application security: Application
security is the process of making
apps more secure by finding, fixing, and enhancing the security of apps.
Much of this happens during the development phase, but it includes tools
and methods to protect apps once they are deployed. This is becoming
more important as hackers increasingly target applications with their
attacks.
Application security is getting a lot of attention. Hundreds of tools are
available to secure various elements of your applications portfolio, from
locking down coding changes to assessing inadvertent coding threats,
evaluating encryption options and auditing permissions and access rights.
There are specialized tools for mobile apps, for network-based apps, and
for firewalls designed especially for web applications.
Why application security is important: The faster and sooner in the
software development process you can find and fix security issues, the
safer your enterprise will be. And, because everyone makes mistakes, the
challenge is to find those mistakes in a timely fashion. For example, a
common coding error could allow unverified inputs. This mistake can
turn into SQL injection attacks and then data leaks if a hacker finds
them.
Application security tools that integrate into your application
development environment can make this process and workflow simpler
and more effective. These tools are also useful if you are doing
compliance audits, since they can save time and the expense by catching
problems before the auditors see them.
The rapid growth in the application security segment has been helped by
the changing nature of how enterprise apps are being constructed in the
last several years. Gone are the days where an IT shop would take
months to refine requirements, build and test prototypes, and deliver a
finished product to an end-user department. The idea almost seems quaint
nowadays.
Instead, we have new working methods, called continuous deployment
and integration, that refine an app daily, in some cases hourly. This
means that security tools have to work in this ever-changing world and
find issues with code quickly.
Application security tools: While there are numerous application
security software product categories, the meat of the matter has to do
with two: security testing tools and application shielding products.
The former is a more mature market with dozens of well-known vendors;
some of them are lions of the software industry such as IBM, CA and
MicroFocus. These tools are well enough along that Gartner has created
its Magic Quadrant and classified their importance and success. Review
sites such as IT Central Station have been able to survey and rank these
vendors, too.
Gartner categorizes the security testing tools into several broad buckets,
and they are somewhat useful for how you decide what you need to
protect your app portfolio:
Static testing, which analyzes code at fixed points during its
development. This is useful for developers to check their code as they are
writing it to ensure that security issues are being introduced during
development.
Dynamic testing, which analyzes running code. This is more
useful, as it can simulate attacks on production systems and reveal more
complex attack patterns that use a combination of systems.
Interactive testing, which combines elements of both static and
dynamic testing.
Mobile testing is designed specifically for the mobile environments
and can examine how an attacker can leverage the mobile OS and the
apps running on them in its entirety.
Another way to look at the testing tools is how they are delivered, either
via an on-premises tool or via a SaaS-based subscription service where
you submit your code for online analysis. Some even do both.
They encompass a few different broad categories:
Runtime application self-protection (RASP): These tools could
be considered a combination of testing and shielding. They provide a
measure of protection against possible reverse-engineering attacks. RASP
tools are continuously monitoring the behavior of the app, which is useful
particularly in mobile environments when apps can be rewritten, run on a
rooted phone or have privilege abuse to turn them into doing nefarious
things. RASP tools can send alerts, terminate errant processes, or
terminate the app itself if found compromised.
RASP will likely become the default on many mobile development
environments and built-in as part of other mobile app protection tools.
Expect to see more alliances among software vendors that have solid
RASP solutions.
Code obfuscation: Hackers often use obfuscation methods to hide
their malware, and now tools allow developer to do this to help protect
their code from being attacked.
Encryption and anti-tampering tools: These are other methods
that can be used to keep the bad guys from gaining insights into your
code.
Threat detection tools: These tools examine the environment or
network where your apps are running and make an assessment about
potential threats and misused trust relationships. Some tools can provide
device “fingerprints” to determine whether a mobile phone has been
rooted or otherwise compromised.
Data Security: Data security is the protection of programs and data in
computers and communication systems against unauthorized access,
modification, destruction, disclosure or transfer whether accidental or
intentional by building physical arrangements and software checks. It
refers to the right of individuals or organizations to deny or restrict the
collection and use of information about unauthorized access. Data
security requires system managers to reduce unauthorized access to the
systems by building physical arrangements and software checks.
Data security uses various methods to make sure that the data is correct,
original, kept confidentially and is safe. It includes-
o Ensuring the integrity of data.
o Two different formats, i.e., hard drive tape backup or DVD (short
term)+flash drive
o One off-site backup, i.e., have two physical backups and one in the
cloud
Some important backup options are as follows-
1. Hard drives - personal or work computer
2. Departmental or institution server
3. External hard drives
4. Tape backups
5. Discipline-specific repositories
6. University Archives
7. Cloud storage
Some of the top considerations for implementing secure backup and
recovery are-
1. Authentication of the users and backup clients to the backup server.
2. Role-based access control lists for all backup and recovery
operations.
3. Data encryption options for both transmission and the storage.
4. Flexibility in choosing encryption and authentication algorithms.
5. Backup of a remote client to the centralized location behind
firewalls.
6. Backup and recovery of a client running Security-Enhanced Linux
(SELinux).
7. Using best practices to write secure software.
access information can only access data that’s deemed necessary for their
role.
resource.”
Wagner says.
“The reality of data spread across cloud service providers and SaaS
enhance security.”
relentlessly, computer viruses infect your programs and files, alter the
to perform any internet activity. Even less harmful computer viruses can
Even if you’re careful, you can pick up computer viruses through normal
Web activities like: