WEB 2.0 AND SECURITY
|
|
|
- Margaret Hill
- 10 years ago
- Views:
Transcription
1 WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express permission of the Government of the HKSAR. Disclaimer: Whilst the Government endeavours to ensure the accuracy of the information in this paper, no express or implied warranty is given by the Government as to the accuracy of the information. The Government of HKSAR accepts no liability for any error or omission arising from or related to the use of the information.
2 TABLE OF CONTENTS Summary... 2 I. What is Web 2.0?... 3 II. Possible Security Threats and Concerns with Web Threats posed by A High Participatory Culture... 4 Security Threats related to AJAX... 5 Security Threats related to Web Feeds... 6 Data Privacy and Intellectual Property Rights... 6 Impact on Internet Resources... 7 III. Precautionary Measures... 8 Protection for IT Practitioners... 8 Protection for End-Users IV. Conclusion Web 2.0 and Security Page 1 of 12
3 SUMMARY Web 2.0 has become a catch-all phrase to describe websites that are more than just plain, static information dissemination. In the Web 2.0 world, the web serves as a platform for people to create and share their own content online in form of blogs (or weblogs), videos or photos. RSS is also embraced by many websites to give a summary of news headlines of interests. By making this platform as user-friendly and accessible as possible, people are encouraged to visit often, and to post and view content. Popular social networking sites, such as MySpace, or video sharing sites, such as YouTube, are prime examples employing Web 2.0 technologies. However, there are two sides to every coin. While Web 2.0 technologies offer many advantages in terms of enriching the Internet and improving the user experience, they are also bringing a number of security concerns and attack vectors into existence. In this paper, we discuss the possible threats introduced by Web 2.0 technologies and suggest corresponding counter-measures. Web 2.0 and Security Page 2 of 12
4 I. WHAT IS WEB 2.0? Web 2.0 does not have a precise definition. To many people, the phrase refers to special web application technologies and websites, such as weblogs and wikis, which use the Internet in a collaborative way to provide services to users. Web 2.0 relies in large part on the user-as-publisher model of interaction and allows for user-created content to be developed and implemented by large groups of individuals. These technologies are increasingly being used by companies for better staff collaboration and communication. O Reilly outlined seven principles that can help distinguish the core features of Web 2.0 applications 1. A number of Web 2.0 services and sites have appeared in the recent years. Some popular services are YouTube ( Facebook ( MySpace ( etc. 1 Web 2.0 and Security Page 3 of 12
5 II. POSSIBLE SECURITY THREATS AND CONCERNS WITH WEB 2.0 A coin always has two sides. While Web 2.0 technologies offer many advantages in terms of enriching the Internet and improving the user experience, they are also bringing a number of security concerns and attack vectors into existence. Because one characteristic for a Web 2.0 application is to encourage greater user involvement, the exposure of the individual user or client to security threats and vulnerabilities increases. The following are common threats in the Web 2.0 arena. THREATS POSED BY A HIGH PARTICIPATORY CULTURE Web 2.0 enables individuals to create and host content on a variety of collaborative platforms such as blogs and wikis. However, depending on how these interactions are managed, the possibility exists for malicious exploitation on those platforms, becoming distribution points for links to fraudulent websites, malicious code, and other security threats such as spyware. Attackers will often take advantage of the implied trust between a community of individual developers and the sites hosting content to compromise individual users and/or websites. For example, a fake video file containing the Zlob trojan was embedded in a video on the YouTube website, and affected a number of users 2. Mechanisms to assure the authenticity and trust-worthiness of publishers will become a major consideration as the content updating process becomes more decentralised. 2 Web 2.0 and Security Page 4 of 12
6 Another possible threat is leakage of corporate information. When a staff member writes and shares information or opinion through a blog, it becomes harder for the organisation to control what information has been published and officially released. Sensitive corporate and customer information may be leaked. In addition, attackers might be able to harvest information about the organisation and launch a social engineering attack on the organisation. SECURITY THREATS RELATED TO AJAX In order to provide a rich user experience, many Web 2.0 sites have employed lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the traditional client-server models, the majority of requests are handled and processed on the server side. AJAX allows a higher proportion of requests to be processed on the client side. This may give malicious users more opportunity to modify any application code running on a client computer when probing and testing an application for vulnerabilities. As AJAX can be used in conjunction with a large number of web services, enabling connectivity between them, this could present additional attack vectors into which malicious users could inject hostile content. As an example, AJAX could serve to amplify the potential of cross-site scripting (XSS) attacks, which seek to inject code into legitimate websites in order to mislead users and steal their information. Not only would this allow an attacker to steal confidential information, it could also allow an attacker to insert malicious code onto the host through malicious scripts. Web 2.0 and Security Page 5 of 12
7 One security vendor has categorised a new class of vulnerability as JavaScript Hijacking. This class of vulnerability specifically affects Web 2.0 AJAX-style web applications 3. Through this vulnerability, an unauthorised party can read confidential data contained in JavaScript messages. An application may be vulnerable if JavaScript is used as a data transfer format, and in particular, when sensitive or confidential information is being handled. SECURITY THREATS RELATED TO WEB FEEDS Under the Web 2.0 characteristic of decentralised and distributed content, web information is distributed to other sites via lightweight syndication protocols, such as RSS and Atom. These web feeds allow both users and websites to obtain content headlines and body text without visiting the site in question. There is no standard mechanism to authenticate the publishers of feed entries. As such, malicious attackers can make use of these web feeds to inject literal JavaScript into the RSS feeds to generate attacks on the client browser. All the attacker needs to do is to insert a literal script injection into standard RSS or Atom elements, such as the Title, Link or Description XML tags for RSS. When an end-user visits this particular website and loads the page with the RSS feed, the malicious script will be executed. DATA PRIVACY AND INTELLECTUAL PROPERTY RIGHTS A further point should be noted with regard to user concerns about privacy and rights to protect their own data. In many of the early Web 2.0 applications, copyright was only loosely enforced. For example, Amazon lay claim to all and any reviews submitted to the 3 Web 2.0 and Security Page 6 of 12
8 site, but in the absence of enforcement, people may repost the same review elsewhere. However, as organisations begin to realise that control over data may be their chief competitive advantage, there will be greater attempts to control access or distribution of data. IMPACT ON INTERNET RESOURCES The wide adoption of AJAX may also impact the network. The use of AJAX technology can result in frequent (non-user-triggered) or even constant data exchanges between a client and a server, and any excessive delay or data loss during these data transfers may have effects that are visible to the users. While it is possible that AJAX (and AJAX developers) will evolve to suit the network (for example, handling the delay or loss in the background), users may also demand more consistent and reliable network performance than today s Internet can deliver. Currently, any request for consistent network performance is usually met by IP QoS mechanisms, but implementing QoS on the public Internet will be considerably more challenging than on a private intranet. Certainly other solutions may surface, making this an interesting area to watch in the future. Web 2.0 and Security Page 7 of 12
9 III. PRECAUTIONARY MEASURES The security concerns discussed in the previous section need to be addressed with necessary precautionary measures. Below we list a small selection. PROTECTION FOR IT PRACTITIONERS Security through Design According to Gartner, poor application development and a lack of oversight when integrating security best practices and tools into the System Development Life Cycle (SDLC) are two of the biggest security issues facing Web 2.0 developers. In the rush to ride the tide of these new services, Web 2.0 applications may not receive the same level of security auditing as traditional client-based applications and services. Like other applications, security considerations should be taken into account at all phases of the SDLC. In particular, implementation of the proper authentication controls, input validation, error handling controls, and so on, is essential to avert threats that may result in unauthorised intrusion. To further ensure adequate protection being implemented, security risk assessments should be conducted before launching any new applications or program releases. Security through Controls Web 2.0 and Security Page 8 of 12
10 As mentioned, Web 2.0 applications are highly client centric. This approach may pose significant threats to a system if adequate controls are not in place. To build an interactive and secure Web 2.0 application, a secure architecture with appropriate controls is an essential component. Some of the building blocks of this architecture include: 1. A solid session management scheme to ensure that authentication and authorisation is performed inside a trusted part of architecture. 2. Data validation is performed in both directions on the server-side at various layers to limit or prevent injection and other forms of attacks. 3. All calls to backend services are performed by trusted server-side business logic. Security through Openness Given that open-source software or APIs are exposed to open scrutiny, they are usually developed with security in mind. Hence, they generally have increased security built in. Instead of following a proprietary approach, proven security protocols and industry standards should be used. If open source software or APIs are used, the software should be tracked to ensure that all licences are valid for use, and published vulnerabilities from these open source software solutions should be addressed in time. Corporate Governance on Web 2.0 Although current Web 2.0 services are mostly public services, outside the organisation, management still needs to be aware of the risks that may impact corporate members who have access to these services. Policies should be established to protect sensitive corporate and/or customer information, and ensure this will not be disclosed in open websites such as blogs. Regular awareness training should also be conducted to educate staff about the Web 2.0 and Security Page 9 of 12
11 company s IT Security Policy and strengthen security awareness around the risks associated with these new technologies. To avoid the risks associated with web feeds, only data feeds from reputable sources should be trusted. For application developers who provide web feeds, preventive measures such as white-listing only those necessary HTML tags should be deployed. This can reduce the possibility of XSS attacks on web feeds. The following are additional best practices that IT practitioners should consider: 1. Although wikis can lead to broader and more rapidly evolving coverage of topics, they are vulnerable to misinformation and anonymous authors could make malicious or unauthorised changes to information being published. In cases where a wiki-type application is to be deployed, editorial controls should be imposed to restrict updates to only legitimate and authorised areas. Proper authentication and access control should also be imposed to better ensure the integrity of content. 2. When a blog is used to communicate an oganisation s vision, or for other promotional purposes, care must be taken to avoid possible leakage of sensitive or proprietary information. Monitoring and filtering of all Blog content should be implemented. Acceptable use policies for blogs should also be distributed to all users. 3. Like other applications, Web 2.0 programs should undergo vigorous vulnerability testing to identify loopholes and uncover any weaknesses, including command injection, cross-site scripting and buffer overflow vulnerabilities. All problem areas should then be fixed and security threats mitigated before the application is released into the production environment. In addition, periodic security assessments should be conducted on a regular basis. Web 2.0 and Security Page 10 of 12
12 PROTECTION FOR END-USERS For end-users, relevant security regulations and policies should be observed, and web feeds from suspicious sources should not be trusted. In balancing functionality with security, one may consider limiting the use of JavaScript in the browser to protect from malicious script 4 attacks. In addition, the latest security patches recommended by the anti-virus product vendors should be applied. When writing and publishing blogs, care must be taken to protect one s own personal data, as well as sensitive or even confidential information about other persons or organisations. For example, personal information such as addresses, mobile phone numbers, or even personal photos should not be disclosed without good reason. The Office of the Privacy Commissioner for Personal Data has also advised that young people publishing on the web should consider the risks involved when releasing personal information in the public domain, so as to protect themselves from possible abuse or illegal activities 5. Young people should also be reminded to respect others people s privacy before disclosing personal data of others over the Internet Web 2.0 and Security Page 11 of 12
13 IV. CONCLUSION Web 2.0 brings new developments to the web and the Internet. However, new security risks also need to be taken into account. In particular, attackers may shift their focus from the server side to the client side, which is usually considered the weakest link in the security chain. Many lessons in security implementation learnt from the earlier Web 1.0 era can be applied to Web 2.0. Although the increased capabilities of Web 2.0 may bring increased risks, many basic security principles routinely put in place for application development in Web 1.0 apply here as well. The fundamental tenets of application security should not be ignored and overlooked. Security should be built into Web 2.0 applications from the earliest stages of development. Security processes, controls and management oversight should be in place before applications are deployed. Periodic and ongoing security risk assessments should be conducted to identify and fix vulnerabilities. Management, application developers and end-users all need to work together to tackle these challenges in the new era of Web 2.0. Web 2.0 and Security Page 12 of 12
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
MUNICIPAL WIRELESS NETWORK
MUNICIPAL WIRELESS NETWORK May 2009 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media
January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
WEB APPLICATION SECURITY
WEB APPLICATION SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
BYOD Guidance: Architectural Approaches
GOV.UK Guidance BYOD Guidance: Architectural Approaches Published Contents 1. Service separation 2. Scenario 1: Exposing internal web applications 3. Scenario 2: Exposing email, calendar and contacts This
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
InfoSphere Guardium Tech Talk Data privacy and dynamic masking for web applications: InfoSphere Guardium for Applications
InfoSphere Guardium Tech Talk Data privacy and dynamic masking for web applications: InfoSphere Guardium for Applications Nick Briers, WW Product Manager Ariel Farkash, Lead Developer Logistics This tech
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk
White Paper. Understanding Web 2.0. Technologies, Risks, and Best Practices
Understanding Web 2.0 Technologies, Risks, and Best Practices White Paper Companies of all sizes are leveraging Web 2.0 technologies to improve Web site usability and to open new channels of communication.
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Mobile Application Threat Analysis
The OWASP Foundation http://www.owasp.org Mobile Application Threat Analysis Ari Kesäniemi Nixu Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1
Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
The British Academy of Management. Website and Social Media Policy
The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Annual Web Application Security Report 2011
Annual Web Application Security Report 2011 An analysis of vulnerabilities found in external Web Application Security tests conducted by NTA Monitor during 2010 Contents 1.0 Introduction... 3 2.0 Summary...
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Malicious Email Mitigation Strategy Guide
CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly
