Web Application Security

Description

Web Application Security Note on Web Application Security, created by Namita Tomar on 13/11/2018.
Namita Tomar
Note by Namita Tomar, updated more than 1 year ago
Namita Tomar
Created by Namita Tomar over 6 years ago
6
0
1 2 3 4 5 (0)

Resource summary

Page 1

Injection :   What ? Untrusted user input is interpreted by server and executed What is impact ? Data modified and stolen. How to prevent it ? - Reject invalid/untrusted input - Use latest frameworks - Hire penetration testers

Page 2

Broken Authentication and session management   What it is ? Incorrectly build auth and session management which allow attackers to impersonate other users. Impact ? Attacker can take identity of victim. How to prevent? Don't develop your own authentication scheme

Page 3

Cross Site Scripting (XSS)   What it is ? Untrusted user input is interpreted by Browser and executed. What is the impact ? Hijack user sessions, deface websites and change content How to prevent it ? Escape untrusted data use latest UI framework.

Page 4

Broken Access Control   What it is ? Restrictions on what authenticated users are allowed to do are not properly enforced.  Impact ? Attackers can access data, view sensitive files and modify data How to prevent it ? - Check access rights to UI level and server level for the requests to resources. - Deny access by default  

Page 5

Security Misconfiguration   What it is ? Human mistake of misconfigurating the system Impact ? Depends on misconfiguration. worst misconfiguration can result in loss of data. How to prevent it ? - Force change of default credentials - Least privilege to system - Static code that scan code for default settings - Keep patching, updating and testing the system - Regularly audit system deployment in production.

Page 6

Sensitive Data Exposure   What it is ? Sensitive data is exposed eg, social security number, passwords, health records. Impact ? Data that is lost, corrupted or exposed have serious implications on business continuity. How to prevent it ? - Always obscure data. - update cryptographic algorithm - use salted encryption on storage of passwords

Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

1.5 Application and Security Controls
DJ Perrone
Diesel Injection Pumps
Paul Allen
OCR Chemistry - Atoms, Bonds and Groups (Definitions)
GwynsM
Question Words - GCSE German
lucykatewarman1227
Cultural Studies
Emily Fenton
GCSE AQA Biology 1 Adaptations, Competition & Environmental Change
Lilac Potato
The Effects of Climate Change
j. stu
New English Literature GCSE
Sarah Egan
1_PSBD New Edition
Ps Test
NSI Course
Yuvraj Sunar