Web Application Security

Description

Web Application Security Note on Web Application Security, created by Namita Tomar on 13/11/2018.
Namita Tomar
Note by Namita Tomar, updated more than 1 year ago
Namita Tomar
Created by Namita Tomar over 5 years ago
5
0

Resource summary

Page 1

Injection :   What ? Untrusted user input is interpreted by server and executed What is impact ? Data modified and stolen. How to prevent it ? - Reject invalid/untrusted input - Use latest frameworks - Hire penetration testers

Page 2

Broken Authentication and session management   What it is ? Incorrectly build auth and session management which allow attackers to impersonate other users. Impact ? Attacker can take identity of victim. How to prevent? Don't develop your own authentication scheme

Page 3

Cross Site Scripting (XSS)   What it is ? Untrusted user input is interpreted by Browser and executed. What is the impact ? Hijack user sessions, deface websites and change content How to prevent it ? Escape untrusted data use latest UI framework.

Page 4

Broken Access Control   What it is ? Restrictions on what authenticated users are allowed to do are not properly enforced.  Impact ? Attackers can access data, view sensitive files and modify data How to prevent it ? - Check access rights to UI level and server level for the requests to resources. - Deny access by default  

Page 5

Security Misconfiguration   What it is ? Human mistake of misconfigurating the system Impact ? Depends on misconfiguration. worst misconfiguration can result in loss of data. How to prevent it ? - Force change of default credentials - Least privilege to system - Static code that scan code for default settings - Keep patching, updating and testing the system - Regularly audit system deployment in production.

Page 6

Sensitive Data Exposure   What it is ? Sensitive data is exposed eg, social security number, passwords, health records. Impact ? Data that is lost, corrupted or exposed have serious implications on business continuity. How to prevent it ? - Always obscure data. - update cryptographic algorithm - use salted encryption on storage of passwords

Show full summary Hide full summary

Similar

Contraception
Matthew Coulson
1.5 Application and Security Controls
DJ Perrone
Diesel Injection Pumps
Paul Allen
Product Design
cmbj
AS Unit 1 Physics Flashcard Deck
Callum McClintock
Global History Regents Review Notes (Europe)
Jen Molte
Who was to blame for the Cold War?
Will Barnes
med chem 2 exam 2
lola_smily
History- Medicine through time key figures
gemma.bell
organic chemistry
osgoconqr
TEORIAS CONTEMPORANEAS
karen lorena miranda rojas