Chapter 4
Chapter 4
Chapter 4
1
Application Security
The process of protecting software applications from a wide range of
2
Application Security
Applying application security throughout the software development lifecycle
Introduce security standards and tools during design and application development
mission critical.
Use security systems such as firewalls, web application firewalls (WAF), and
3
intrusion prevention systems (IPS).
Application Security architecture
4
Application Security attack
is a type of cyber attack that targets software applications in order to exploit
vulnerabilities and gain unauthorized access to data or systems.
It can expose passwords, health records, credit card numbers, and personal
6
data.
Application Security attack…
2. Security Misconfiguration: is a type of security vulnerability that occurs
when an application or system is configured in a way that leaves it vulnerable
to attack.
Outdated software
This can cause the data to spill over into adjacent memory locations,
potentially overwriting other critical data causing the program to behave
unpredictably or crash.
E.g. C, C++
8
Application Security attack
Solution for Buffer overflow
a. Address space randomization (ASR)-randomly moves around the
address space locations of data regions.
b. Data execution prevention:-flags certain areas of memory as non-
executable or executable, which stops an attack from running code in
a non-executable region.
c. Input validation
Protection mechanism
1. Stored XSS attack, the attacker is able to inject malicious code directly into
the web application's database,
Reflected XSS attack, the attacker is able to inject malicious code into a
web page that is immediately returned to the user's browser as part of a
response from the server.
11
Application Security attack
Cross-site scripting attacks(XSS) :
Protection
software developers must validate user input and encode output. 12
Application Security attack
SQL injection attacks : are a type of cyber attack that target web
applications that use SQL databases.
The attacks inserting malicious SQL code into an application's input fields,
which can be executed by the underlying database.
It can occur when an application does not properly validate user input or
sanitize user input before using it in SQL queries.
13
Application Security attack
SQL injection attacks
Retrieve any number of items, including sensitive company data, user lists
or private customer details.
SELECT ItemName, ItemDescription
FROM Item
WHERE ItemNumber = ItemNumber
14
Application Security attack
Hijacking is a type of network attack in which the attacker takes over
control and communication between the victim system and the network.
Prevention
Encrypting all data transmitted on a web page.
Using HTTPS certification on websites.
Keeping your browsers updated and patched. 15
Types of Application Security
Authentication, authorization, encryption, logging, and application security
testing are all examples of application security features.
Comparing the user's identification to a list of authorized users, the system may
verify that the user has permission to access the application.
Encryption:- a security measures can safeguard sensitive data from being seen or
utilized by a cybercriminal after a user has been verified and using the application.
Traffic containing sensitive data that flows between end-user and cloud in cloud-
based applications can be encrypted to keep the data safe.
Logging :-it can assist in determining who gained access to the data and how they
did
Application log files keep track of which parts of the application have been
17
accessed and by whom.
Tools for Application Security
A complete application security approach used for detection, remediation
and resolution of a variety of application vulnerabilities and security
challenges.
This testing can detect issues of buffer overflows, SQL injection etc.,
which performed during the development phase of an application.
helps identify issues such as query strings, use of scripts, requests and
responses, memory leakage, authentication, cookie and session
handling, execution of third-party components, and data injection.
22
Application Security Approaches
phase.
security issues
A Denial of Service (DoS) attack is intended to clog a system with fake requests
26
Operating System Security
Authentication: is the responsibility of the Operating System to create a
protection system which ensures that a user who is running a particular program
is authentic. E.g. user name and password, Biometric signatures etc.
One Time passwords :- a unique password is required every time user tries to
login into the system
Installing a firewall and ensuring that properly set to monitor all incoming and
outgoing traffic.
27
Operating System Security
Access control:- specifies who can have access to a system resource
and what type of access each entity has.
User management:- enables users to access and control digital assets, such
as applications, devices, networks
29
Mobile security the protection of mobile devices, such as smartphones
and tablets, from unauthorized access, theft, malware, and other security
threats.
Mobile devices can be attacked by potentially malicious apps,
network-level attacks, and exploitation of vulnerabilities within the
devices and mobile OS.
Protection
Keep your software updated
Install a firewall.
Download apps from official app stores.
Always read the end-user agreement 30
Web security: the practice of protecting websites and web
applications from various types of cybersecurity threats, such as
hacking, data breaches, and malware.
websites and web applications often handle sensitive information,
such as user passwords and financial data, and a security breach can
have serious consequences for both users and businesses.
protection: browser policies, session mgmt, user authentication
HTTPS
Web application firewall
31
Network security: the practice of protecting computer networks from
various types of cybersecurity threats, such as unauthorized access, data
breaches, and malware.
Network security is important because computer networks often handle
sensitive information, such as personal data, financial information, and
intellectual property, and a security breach can have serious
consequences for both individuals and organizations.
protection
Use access control
VPN
Firewall
32
Risk management
It is the process of identifying, assessing, and controlling risks that
may impact an organization's operations, projects, or assets.
It involves developing strategies and techniques to mitigate risks and
minimize their potential impact on the organization.
It is an essential component of business planning and decision-
making, and it helps organizations to protect their assets, reduce
losses, and improve their overall resilience.
Risk management process involves the following steps:
1. Risk identification: This identifying potential risks that may impact
the organization, such as financial risks, operational risks, or
reputational risks. 33
Risk management…
Risk management process involves the following steps:
2. Risk assessment: assessing the likelihood and potential impact of
each identified risk, and prioritizing them based on their level of risk.
3. Risk mitigation: developing strategies and techniques to mitigate the
potential impact of identified risks, such as implementing control
measures, transferring risk to an insurance provider, or avoiding the risk
altogether.
4. Risk monitoring and review: monitoring the effectiveness of the risk
management strategies and reviewing the risk management plan on a
regular basis to ensure that it remains relevant and effective.
34
Risk management…
Four main risk management strategies, or risk treatment options:
1. Risk Avoidance: avoiding the activity or situation that poses the risk,
either by not engaging in the activity or by changing the approach to
eliminate the risk altogether.
2. Risk Reduction: taking steps to reduce the likelihood or impact of the
risk.
by implementing controls or safeguards, such as security measures to
minimize the chances of the risk occurring or lessen its impact.
3. Risk Transfer: transferring the risk to another party, such as an insurance
company or a third-party vendor
4. Risk Acceptance: accepting the risks and developing a plan to manage
them if they occur. the cost of managing the risk is greater than the 35
Risk management
frameworks
are a set of processes, policies, and procedures that are used to
identify, assess, and manage risks in an organization.
The goal of a risk management framework is to minimize the impact
of potential risks on an organization's operations, assets, and
reputation.
It includes risk identification, risk measurement and assessment, risk
mitigation, risk reporting and monitoring, and risk governance.
36
Security System assessment and evaluation
Security System assessment is the process of evaluating the security
of a system or application to identify vulnerabilities and
weaknesses that could be exploited by attackers.
37
Security System assessment and evaluation
The choice of assessment type depends on the goals and needs of the
organization, as well as the specific risks and threats faced by the
system or application.
40
End of course
41