Web Application Security

Description

Web Application Security Note on Web Application Security, created by Namita Tomar on 13/11/2018.
Namita Tomar
Note by Namita Tomar, updated more than 1 year ago
Namita Tomar
Created by Namita Tomar about 6 years ago
6
0

Resource summary

Page 1

Injection :   What ? Untrusted user input is interpreted by server and executed What is impact ? Data modified and stolen. How to prevent it ? - Reject invalid/untrusted input - Use latest frameworks - Hire penetration testers

Page 2

Broken Authentication and session management   What it is ? Incorrectly build auth and session management which allow attackers to impersonate other users. Impact ? Attacker can take identity of victim. How to prevent? Don't develop your own authentication scheme

Page 3

Cross Site Scripting (XSS)   What it is ? Untrusted user input is interpreted by Browser and executed. What is the impact ? Hijack user sessions, deface websites and change content How to prevent it ? Escape untrusted data use latest UI framework.

Page 4

Broken Access Control   What it is ? Restrictions on what authenticated users are allowed to do are not properly enforced.  Impact ? Attackers can access data, view sensitive files and modify data How to prevent it ? - Check access rights to UI level and server level for the requests to resources. - Deny access by default  

Page 5

Security Misconfiguration   What it is ? Human mistake of misconfigurating the system Impact ? Depends on misconfiguration. worst misconfiguration can result in loss of data. How to prevent it ? - Force change of default credentials - Least privilege to system - Static code that scan code for default settings - Keep patching, updating and testing the system - Regularly audit system deployment in production.

Page 6

Sensitive Data Exposure   What it is ? Sensitive data is exposed eg, social security number, passwords, health records. Impact ? Data that is lost, corrupted or exposed have serious implications on business continuity. How to prevent it ? - Always obscure data. - update cryptographic algorithm - use salted encryption on storage of passwords

Show full summary Hide full summary

Similar

Contraception
Matthew Coulson
1.5 Application and Security Controls
DJ Perrone
Diesel Injection Pumps
Paul Allen
Chemistry General Quiz - 2
lauren_johncock
2014 GCSE History Exam Paper Setup
James McConnell
The SAT Test
philip.ellis
Biology AQA 3.1.3 Cells
evie.daines
Plant and animal cells
charlotteireland
Summary of Definitions/Key Terms for the PMP Exam
Andrea Leyden
Periodic table - full deck of element symbols
Derek Cumberbatch
Biology - B1 - AQA - GCSE - Keeping Healthy and Defending Against Infection
Josh Anderson