Web Application Security - Unit 1 Notes
Web Application Security - Unit 1 Notes
Web application security refers to the set of measures and practices designed to
protect web applications from various cyber threats, vulnerabilities, and
unauthorized access. With the increasing reliance on web-based technologies for
business operations, e-commerce, and communication, ensuring the security of
web applications is crucial to safeguard sensitive data and maintain the integrity
and availability of online services.
2. **Authentication Factors:**
- **Something You Know:** Passwords, PINs.
- **Something You Have:** Smart cards, security tokens.
- **Something You Are:** Biometrics like fingerprints, retina
scans.
**Authentication Methods:**
1. **Single-Factor Authentication (SFA):**
- Relies on one authentication factor (e.g., password only).
**Best Practices:**
1. **Strong Password Policies:** Encourage users to create complex
passwords and update them regularly.
**Definition:**
Authorization is the process of granting or denying access to specific
resources, functionalities, or data based on the authenticated user's
permissions.
**Key Elements:**
1. **Roles and Permissions:** Users are assigned roles, and each role
has specific permissions defining what actions or data the user can
access.
**Authorization Models:**
1. **Role-Based Access Control (RBAC):**
- Users are assigned roles, and roles are associated with specific
permissions.
**Best Practices:**
1. **Principle of Least Privilege (PoLP):**
- Securely manage user sessions to prevent unauthorized access or
session hijacking.
2. **Token Security:**
- If using tokens for authentication, ensure they are securely
generated, transmitted, and validated.
Introduction:
Authentication verifies the identity of users, ensuring they are who they
claim to be, while authorization determines the actions and resources a user
is allowed to access within an application. Together, these mechanisms form
the foundation of web application security.
Conclusion:
Change-cipher Protocol:
This protocol uses the SSL record protocol. Unless Handshake Protocol is
completed, the SSL record Output will be in a pending state. After the
handshake protocol, the Pending state is converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in
length and can have only one value. This protocol’s purpose is to cause the
pending state to be copied into the current state.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.