Common Web Application Attack Types and Security Using ASP.NET
|
|
|
- Malcolm Fox
- 9 years ago
- Views:
Transcription
1 UDC Common Web Application Attack Types and Security Using ASP.NET Bojan Jovičić 1, Dejan Simić 1 1 FON Faculty of Organizational Sciences, University of Belgrade P. O. Box 52, Jove Ilića 154, Belgrade, Serbia and Montenegro [email protected], [email protected] Abstract. Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situation in IT environment. ASP.NET offers powerful mechanisms to render these attacks futile, but it requires some knowledge of implementing Web application security. This paper focuses on attacks against Web applications, either to gain direct benefit by collecting private information or to disable target sites. It describes the two most common Web application attacks: SQL Injection and Cross Site Scripting, and is based on author s perennial experience in Web application security. It explains how to use ASP.NET to provide Web applications security. There are some principles of strong Web application security which make up the part of defense mechanisms presented: executing with least privileged account, securing sensitive data (connection string) and proper exception handling (where the new approach is presented using ASP.NET mechanisms for centralized exception logging and presentation). These principles help raise the bar that attacker has to cross and consequently contribute to better security. 1. Introduction The security of information systems is a wide area. Its development followed that of information systems, whose development in turn followed advances in hardware. As computers and software have developed real fast: "To put it quite bluntly: as long as there were no machines, programming was no problem at all; when we had a few weak computers, programming became a mild problem, and now we have gigantic computers, programming had become an equally gigantic problem." [1], so have developed the possibilities for security breaches. Security and protection are very important areas of computers science and IT industry. One way to describe this area is: "Security can be defined as set of methods and techniques which control data accessed by executing applications. Even wide definition includes a set of methods, techniques and legal standards which control data access by applications and humans, and protect the physical integrity of whole computer system, no matter if it is distributed or not, or if it is centralized or decentralized." [2].
2 Bojan Jovičić, Dejan Simić According to the American Computer Security Institute (CSI) s 2005 Computer Crime and Security Survey, which enclosed big corporations, 56% of the subjects reported the detection of unauthorized use of their computer systems in last year. Also, according to the same survey, more than 95% of responding organizations experienced more than 10 Web site incidents. [3]. Today IT security has many sub areas focusing on different aspects of security, from lower levels of ISO OSI model, all the way to the application layer. Since security in lower levels has made significant improvements in past time, hackers try to get their way into system using the topmost layer. The application layer is specially exposed when used on the Internet in the form of the Web applications. This paper will try to shed some light on making the Web applications more secure, since this area is mostly the responsibility of developer or is an effect of joint effort of developers and administrators. 2. Web application security As digital enterprises embrace benefits of e-business, Web technology usage will continue to grow. Companies today use the Web as CRM (Customer Relationship Management) channel, as the means of improving supply chains, means of entrance in new markets, and for delivering products and services to customers and employees. However, successful implementation using Web technologies cannot be attained without consistent approach to the Web application security. In considering the Web application security, corporations often don t consider the following [4]: Today the hackers are one step ahead of enterprise (hackers use the newest out of the box applications, while companies have problems with setting base security measures) It is not a question of IF your site will be attacked, but WHEN. Passwords are not enough (don t use the passwords based on publicly available data about you, but use strong passwords) SSL and data encryption are not enough (SSL guarantees secrecy of traffic, but does not protect from Web application misuse) Firewalls are not enough (port 80 or port 443 are enough for an attacker) Standard scanning programs are not enough (these programs scan for standard mistakes, and can not evaluate security by checking contents of the Web application) A chain is as strong as it s weakest link It s in the code (most commonly the security neglect is in code, because applications are implemented by the unprofessional developers, or the developers that don t pay much attention to security, since primary concerns are often speed and implementation of the required functionalities) 84 ComSIS Vol. 3, No. 2, December 2006
3 Common Web Application Attack Types and Security Using ASP.NET Manipulating a Web application is simple (plain Web browser and some determination are enough) If it is in the code, then the coder needs to know how to code properly, or in security context, how to code defensively. A definition of defensive programming is given in [5]: Defensive programming doesn t mean being defensive about your programming It does so work! The idea is based on defensive driving. In defensive driving, you adopt the mind-set that you re never sure what the other drivers are going to do. That way, you make sure that if they do something dangerous you won t be hurt. You take responsibility for protecting yourself even when it might be the other driver s fault. In the defensive programming, the main idea is to handle all possible errors including the errors in other cooperative routines or programs. More generally, it s the recognition that programs will have problems and modifications, and that a smart programmer will develop code accordingly. 3. Common Web application attack types Bellow is the list of some of the most common Web attack types: SQL Injection (a security vulnerability that occurs in the database layer of an application) Cross-Site Scripting (causes a user's Web browser to execute a malicious script) Web site defacement (occurs when a hacker breaks into a web server and alters the hosted website or creates one of his own) Buffer Overflow (hackers exploit buffer overflows by appending executable instructions to the end of data and causing that code to be run after it has entered memory) DOS (Denial Of Service - an assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted) Password Cracking (the process of recovering secret passwords from data that has been stored in or transmitted by a computer system, typically, by repeatedly verifying guesses for the password) This list can probably be a lot longer, but this work concentrates on the two first listed items. These two Web attacks are listed in the top ten most critical web application security vulnerabilities [6]. According to the statistical analysis of results obtained from the numerous application level penetration tests performed by the Imperva experts for various customers over the years , SQL Injection makes 10% and Cross-Site Scripting makes 9% of the attack types [7]. ComSIS Vol. 3, No. 2, December
4 Bojan Jovičić, Dejan Simić Another common thing for these two types of attack is that both can be prevented by a developer. Some of the principles of good coding practice presented in this paper can be used to help prevent some other attack types listed here Sql Injection The basic idea behind SQL Injection attack is abusing Web pages which allows users to enter text in form fields which are used for database queries. Hackers can enter a disguised SQL query, which changes the nature of the intended query. Hence the queries can be used to access the connected database and change or delete its data. Although protection from this kind of attack is very simple (especially using Microsoft.NET technologies), there is a big number of Internet systems which are vulnerable to this kind of attack. SQL query generated by concatenation of the static part of the query and values intended for form fields is the base of this attack. For example, if there is a field for entering the username (tbuser) and a field for entering the password (tbpassword) and we perform authentication in the following manner: string Query = "SELECT COUNT(*) FROM [User] WHERE Username = '" + tbuser.text + "' AND Password = '" + tbpassword.text + "'"; SqlCommand Command = new SqlCommand(Query, Connection); if ((int) Command.ExecuteScalar() > 0)... It is enough for a malicious user to enter disguised SQL query in the username field, like: ' OR 1=1 -- This would turn the database query into: SELECT COUNT(*) FROM [User] WHERE Username = '' Or 1 = 1 --' AND Password = '' Since -- marks beginning of comment line in SQL (The comment operator - - is supported by many relational database servers, including Microsoft SQL Server, IBM DB2, Oracle, PostgreSQL, and MySql [8]), this query is equivalent to 86 ComSIS Vol. 3, No. 2, December 2006
5 Common Web Application Attack Types and Security Using ASP.NET SELECT COUNT(*) FROM [User] WHERE Username = '' Or 1 = 1 Since 1=1 always evaluates to true, this query will always return more than 0 rows, if there are records in table, so that malicious user can easily authenticate with invalid credentials. For this kind of attack, it is not necessary that parameters are passed by POST form method. If the query is formed based on the parameters passed in GET request, and is created using concatenation, the effect is the same. Besides this kind of misuse, SQL Injection can be used for getting sensitive data from database, updating/deleting data, and other kind of malversations. If the malicious user wants to gather extra data from database, he can use union SQL operator (UNION). This kind of information extracting is especially devastating if the user is familiar with database structure, because if he is not, he will have to gather extra data about database structure from system tables. Syntax for this kind of SQL Injection would be something like this: ' UNION SELECT...,id,name,... FROM sysobjects WHERE xtype = 'U' -- Here... should be replaced with literals which are needed to match number and data type of columns. If a hacker discovers that there is a table Users (and often there is), next step could be retrieval of the usernames and passwords: ' UNION SELECT..., Username, Password,... FROM [User] -- Again the matching of number and data type of columns is required. Updating is possible using SQL Injection like: '; UPDATE Product SET UnitPrice = This would set false prices to all products, although a smart hacker would lower the price to just one product, order it, and then return the original price. In the same fashion, the hackers can delete whole tables (using DROP command). The hackers can run system stored procedures, as xp_cmdshell. xp_cmdshell is one of the most dangerous stored procedures, since it executes given command on the server (the machine, not DBMS). Perhaps equally powerful in this context is stored procedure sp_makewebtask. It puts ComSIS Vol. 3, No. 2, December
6 Bojan Jovičić, Dejan Simić query result in the given web page. This page can use UNC pathname as an output location. This means that the output file can be placed on any system connected to the Internet that has a publicly writable SMB share on it (The SMB request must generate no challenge for authentication at all) [9]. The degree of possible damage depends on the access rights defined for the account used to access database. It is a good rule to use an account with the least privileges. However, this rule is rarely used, since the most applications use the system administrator database account. It is very important to understand that this kind of attack is not limited to SQL Server. The more powerful SQL dialect DBMS supports, the more vulnerable the database to this kind of attack is. SQL Injection attacks are not limited to ASP.NET applications. Classical ASP, Java, JSP, and PHP applications are at equal risk [10]. Protection from this kind of attack includes the following principles [10][11]: "All input is evil" Never use input for database queries that is not validated. Here ASP.NET helps with regular expression validation control: RegularExpressionValidator. To use this controls, it is enough to set its attributes for which control to validate, and which regular expression to use for validating. It is important to note that validation is performed on both client (using JavaScript) and server side, so no postback overload is generated during invalid postback attempts. This kind of approach (validation restriction) is possible in two forms: by forbidding problematic characters, or by allowing a limited set of required characters. Although the approach with forbidding problematic characters (ie. apostrophe and dash) is easier for application, this approach is suboptimal for two reasons: first, it is possible to miss the character that is useful to the hackers, and second: often, there are multiple ways to represent problematic characters [11]. The hackers can use the escape characters to create apostrophe, and avoid validation. No matter which approach is applied, it is very useful to limit the length of input, since some kinds of this attack require very big number of characters. For example, regular expression used for password and login fields with 4-12 characters length could be: [\d_a-za-z]{4,12} If you sometimes have to allow entering of apostrophe, use Replace method of String class: string SanitizedUserInput = UserInput.Replace("'", "''"); Avoid dynamic SQL 88 ComSIS Vol. 3, No. 2, December 2006
7 Common Web Application Attack Types and Security Using ASP.NET Never generate SQL queries by concatenating strings, but rather use SQL parameters..net provides classes for query parameters with automatic control of parameter values, and provides safe work of application, even without adhering to the first principle. These classes (in.net there are more of these classes for different data providers: SqlClient, OleDB, Oracle, Odbc) perform control of passed values, so this kind of protection is an excellent defense against SQL Injection attack. Our corrected code for querying could look like this: string Query = "SELECT COUNT(*) FROM [User] WHERE UserName AND Password SqlCommand Command = new SqlCommand(Query, Connection); Command.Parameters.Add(new SqlParameter("@Username", tbuser.text)); Command.Parameters.Add(new SqlParameter("@Password", tbpassword.text)); In this manner we are sure that.net will perform all necessary checks and conversions to prevent evil SQL query. More control can be added by providing field length: SqlParameter parusername = new SqlParameter("@Username", SqlDbType.VarChar, 20); parusername.value = tbuser.text; Command.Parameters.Add(parUsername); Next step should be replacing queries with stored procedures. Stored procedures provide additional safety effect, since they are used with parameters, and DB access account can be granted rights to use the stored procedures instead of the rights to access tables directly. In this way the extent of possible damage is greatly reduced. Execute with the least privilege Never use the database administrator account (which is usually a member of System Administrator role), but use the special account with defined access rights, or with membership in proper role with defined rights. By declaring access rights on the stored procedures instead of tables, you are giving hackers plenty of problems, since they can t access tables directly, but using the stored procedures. Proper exception handling ComSIS Vol. 3, No. 2, December
8 Bojan Jovičić, Dejan Simić Bad exception handling is one of the areas hackers will try to use, especially in SQL injection, because it provides them with feedback which greatly eases attack procedure. If Web application has proper exception handling mechanism, this kind of attack turns into blind SQL injection attack. This mechanism should provide minimum of information that could help hackers, and should keep detailed info in different logs. There should be a balance between messages helping an ignorant user and giving too much information to hackers. Setting Web applications for desired behavior in ASP.NET is very easy. It is enough to set debug attribute in Web.config file to false, customerrors attribute to On or RemoteOnly. Value On always shows defined error page, while RemoteOnly allows local machine users to get detailed information about errors, and remote ones get defined error page. You should never use Off value in production. Besides that, ASP.NET provides two more extremely useful mechanisms in exception handling. One of them is the possibility to define a custom page to display errors. This page will replace the default ASP.NET error page (known as "yellow screen of death" in ASP.NET developer community). This page can contain a friendly message and a form where users can describe actions that brought to the error generation. This page is set using defaultredirect attribute of element in Web.Config file. Other equally powerful mechanism is application centralized exception handling of all unhandled exceptions. By implementing Application_OnError method you get the possibility to examine each unhandled exception. This method is implemented in Global.asax file, which contains all global application events. In this paper proposed approach for best exception handling is combining these two mechanisms so you can log the exception and then show the custom error page. In this manner you get both the system error description, plus user description of actions that caused the exception. Store secrets securely It is very easy to use SQL injection to retrieve data from tables which hold usernames and passwords. This table often has its data in clear text. Much better approach is to keep data encrypted or hashed. In case of passwords, hash is better, since it can t be decrypted, and there is no need for securing the key used for encryption. Hash can be additionally reinforced by applying salt (cryptographically safe random value) to hash. Hashing in.net is performed using GetNonZeroBytes method of RNGCryptoServiceProvider class for generating cryptographically safe random value. Then this value is turned into Base64 string using ToBase64String method of Convert class. After joining secret and salt, we apply some of hashing algorithms to this string (.NET contains implementations of following hashing algorithms: MD5, SHA1, SHA256, SHA384 and SHA512). 90 ComSIS Vol. 3, No. 2, December 2006
9 Common Web Application Attack Types and Security Using ASP.NET Although not directly connected with SQL Injection attack, connection string protection (being some of the most sensitive data) is very important, especially if it contains password for DB access. Since there is a need for the decrypted version of connection string, hashing is not an option. Usual place for keeping connection string are configuration files (Web.Config in ASP.NET applications). As with every encryption/decryption, the problem is safety of the key used in this process. One of solutions to this problem is the Win32 Data Protection API (DPAPI) for encrypting and decrypting data [13]. DPAPI is particularly useful in that it can eliminate the key management problem exposed to applications that use cryptography. While the encryption ensures the data is secure, you must take additional steps to ensure the security of the key. DPAPI uses the password of the user account associated with the code that calls the DPAPI functions in order to derive the encryption key. As a result the operating system (and not the application) manages the key. It also supports adding additional entropic value, for reinforcing the key Cross-Site Scripting CSS (Cross-Site Scripting) or XSS is possible with dynamic pages showing the input that is not properly validated. This allows the hacker to inject the malicious JavaScript code in a generated page and execute the script on a computer of any visitor of that Web site. Cross-site scripting could potentially impact any site that allows users to enter data. This vulnerability is commonly seen on: Search engines that echo the search keyword that was entered, Error messages that echo the string that contained the error, Forms that are filled out where values are later presented to the user, and Web message boards that allow users to post their own messages [14]. A hacker that successfully uses cross-site scripting can access sensitive data, steal or manipulate cookies, create HTTP requests which can be mistaken for those of a valid user, or execute malicious code on an end-user system. A typical CSS attack entails that the unsuspecting user follows a luring link that embeds escaped script code. The fraudulent code is sent to a vulnerable page that trustfully outputs it. Here's an example of what can happen: <a href=" <script>document.location.replace( ' + document.cookie); </script>">click here to win Master Studies Scholarship!</a> ComSIS Vol. 3, No. 2, December
10 Bojan Jovičić, Dejan Simić The user clicks on an apparently safe link and ends on a vulnerable page with a piece of script code that first gets all the cookies on the user's machine and then sends them to a page on the hacker's Web site. It is important to note that CSS is not a vendor-specific issue and doesn't necessarily exploit holes in the Internet Explorer. It affects every Web server and browser currently on the market. Even more important, note that there's no single patch to fix it. You can surely protect your pages from CSS, you do so by applying specific measures and sane coding practices [15]. You should be aware that <img src> and <a href> can also point to script code, not just a classic URL. For example, the following is a valid anchor: <a href= javascript:alert(1); >Click here to win Master Studies Scholarship! </a> Note that there is no script block here. Other notable fact is that user doesn t actually need to click the link. The malicious code can be set in an OnMouseOver event. The JavaScript alert method is often used to test for CSS vulnerability. Some Web pages echo text passed by URL parameters, i.e. ing%20user If this page echoes parameter value on the page, it is possible to inject the malicious code instead of Nonexisting%20User. A hacker has to study the HTML code of the target page, and try to override page, to create more damage. The idea is to send data to an custom address where this data will be saved: </form><form action="login.aspx" method="post" onsubmit="xssimage = new Image;XSSimage.src=' + documents.forms(1).tbusername.value + ':' + document.forms(1).tbpassword.value;"> This code should be injected in typical login page. The first part of attack code ("</form>") closes the original form, and the next part defines start of a new form which encloses existing elements. The new form uses the same attributes for the method and action of form, but has an additional attribute OnSubmit added in form definition. This attribute sets instructions to be executed when the user clicks submit button, and before sending the real form request. 92 ComSIS Vol. 3, No. 2, December 2006
11 Common Web Application Attack Types and Security Using ASP.NET The first command creates a new image object. The second one specifies URL address of the image. Location will always start with an address of some site, that the hacker has access to. The second part of URL will be values of tbusername and tbpassword fields, separated by colon. So, when the new image object is created, which will happen when the user submits this typical login form, a request will be secretly sent to address This request will contain credentials of the user trying to login. Right after this malicious request, real form submission will occur, so that user has no idea that anything unusual happened. The hacker just needs to retrieve data from his Web site. Usually the hackers send enormous number of messages, in which they invite users to click the malicious link. From this huge number, certainly a few users will click and become victims. In order for CSS to be exploited, the user browser must allow some kind of scripting language. Vulnerability to this kind of attack can be mitigated by the proper filtering of user input. All alphanumerical data entered by user should be URL encoded, and then displayed to the user. In this way "<" (less then) would be converted to "<". Here ASP.NET helps with HtmlEncode method of HttpServerUtility class. So the typical Cross-Site Scripting vulnerability test code would be encoded as: <script>alert('xss')</script> When this is presented in a page, it is totally harmless. Besides this, ASP.NET performs automatic validation of the page to prevent scripting attacks. This validation is present in ASP.NET since version 1.1. Validation is performed on objects of the QueryString, Form and Cookies collections. The collection QueryString contains parameters passed through URL, and the Form collection contains form objects, while the Cookies collection contains cookies. This validation is active if the ValidateRequest attribute of page is set to true, or if this attribute for the whole application is set to true. By default, this is set to true for each page. This validation will reject any potentially dangerous code which is passed as a request in above mentioned collections, and will generate an exception. From the end user aspect, the easiest solution to Cross-Site Scripting problem would be to turning off the support for all scripting languages. However this leads to loss of functionality of such a level, that some sites are rendered useless. Even this measure can t help if a hacker injects code in URL, or enters it in existing form. It is recommended for end users to take care how they are visiting new Web sites. They should never click unknown links in messages from unknown senders. It is best to follow the links from main site, which has been used before. There are some attempts to create personal Web firewall application that will mitigate cross-site scripting attacks. One of these is Noxes [16] which acts as a Web proxy and uses both manual and automatically generated rules to ComSIS Vol. 3, No. 2, December
12 Bojan Jovičić, Dejan Simić mitigate possible cross-site scripting attempts. Noxes effectively protects against information leakage from the user s environment while requiring minimal user interaction and customization effort. 3.3 Tools for identifying Web application security holes If a developer is not paying attention to security during development, someone else (ie. IT professional or Systems Administrator) can use custom tools in order to check if application has security breaches and inform the developer about them. Some of the tools for Web application security analysis are: SWAP (Secure Web Applications Project) [17] WebSSARI [18] WebInspect [19] 4. Conclusion It is up to the developer to use provided mechanisms, and create safe code. For the developers that aren t into security there are some tools that can help in Web application security analysis, but these tools only identify the problem, they don t eliminate it. In order to eliminate application security problems the developers have to pay attention to security and have to code securely. In this paper we have shown that ASP.NET, and now ASP.NET 2.0, integrates a number of defense mechanisms that can be easily applied: Classes for SQL parameters that prevent SQL injection, Automatic checking for CSS attack, and Custom error pages and centralized exception handling. These mechanisms combined with other defense techniques and security strategies create powerful toolset to secure application functionalities in the Internet environment with minimal effort from the developer. 5. References 1. Dijkstra, E.: The Humble Programmer. ACM Turing Lecture (1972) 2. Simic, D.: Materials from lectures for post graduate studies of "Security techniques in computer networks". Faculty of Organizational Sciences, Belgrade (2005) 3. Lawrence, G. et al.: CSI/FBI Computer Crime and Security Survey. Computer Security Institute (2005). [Online]. Available: (current 2005) 94 ComSIS Vol. 3, No. 2, December 2006
13 Common Web Application Attack Types and Security Using ASP.NET 4. Sima, C.: Security at the Next Level. SPI Dynamics (2004). [Online]. Available: (current 2004) 5. McConnell, S.: Code Complete, 2nd edition. Microsoft Press, (2004) 6. The Open Web Application Security Project: The Ten Most Critical Web Application Security Vulnerabilities. The Open Web Application Security Project (2004). [Online]. Available: (current 2004) 7. Surf, M., Amichai, S.:How safe is it out there?. IMPERVA (2004). [Online]. Available: (current 2004) 8. Howard, M., LeBlanc, D.: Writing Secure Code, 2nd edition. Microsoft Press (2003) 9. Spett, K.: SQL Injection. SPI Dynamics (2002). [Online]. Available: (current 2002) 10. Litwin, P.: Data Security: Stop SQL Injection Attacks Before They Stop You. MSDN Magazine (September, 2004) 11. Advosys Consulting Inc.: Writing Secure Web Applications. Advosys Consulting Inc (March, 2004) 12. World Wide Web Consortium: Character entity references in HTML 4. World Wide Web Consortium (2006). [Online]. Available: (current 2006) 13. Meier, J.D. et al.: Building Secure ASP.NET Applications: Authentication, Authorization, and Secure Communication. Microsoft Patterns and Practices. Microsoft Corporation, (2002) 14. Spett, K.: Cross-Site Scripting. SPI Dynamics (2002). [Online]. Available: (current 2002) 15. Esposito, D.: Take Advantage of ASP.NET Built-in Features to Fend Off Web Attacks. Wintellect (2005). [Online]. Available: (current 2005) 16. Kirda, E. et al.: Noxes: A Client-Side Solution for Mitigating Cross-Site Scripting Attacks. ACM (2006) 17. Scott, D., Sharp, R.: Developing Secure Web Applications. IEEE Computer (November/December 2002) 18. Huang, Y.W. et al.: Securing Web Application Code by Static Analysis and Runtime Protection. ACM (2004) 19. SPI Dynamics: WebInspect - Your Web Security Partner (2006). [Online]. Available: (current 2006) ComSIS Vol. 3, No. 2, December
14 Bojan Jovičić, Dejan Simić Bojan Jovicic is a MSc student at FON Faculty of Organizational Sciences, University of Belgrade. He is working at DELTA SPORT as a Sr. Software Developer, mostly in.net and MS Dynamics AX. Bojan Jovicic holds Microsoft Certified Professional, Microsoft Certified Application Developer and Microsoft Certified Solution Developer title in.net. He also holds the title of Microsoft Business Solutions Certified Professional in Axapta 3.0 Programming. Bojan has created over 30 web applications, some of them reaching over 6000 visits per day. His interests are Web application development and security, MS Dynamics AX development and business process management. Dejan Simic, PhD, is a professor at the Faculty of Organizational Sciences, University of Belgrade. He received the B.S. in electrical engineering and the M.S. and the Ph.D. degrees in Computer Science from the University of Belgrade. His main research interests include: security of computer systems, organization and architecture of computer systems and applied information technologies. 96 ComSIS Vol. 3, No. 2, December 2006
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
SECURING APACHE : THE BASICS - III
SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
SQL Injection for newbie
SQL Injection for newbie SQL injection is a security vulnerability that occurs in a database layer of an application. It is technique to inject SQL query/command as an input via web pages. Sometimes we
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
How I hacked PacketStorm (1988-2000)
Outline Recap Secure Programming Lecture 8++: SQL Injection David Aspinall, Informatics @ Edinburgh 13th February 2014 Overview Some past attacks Reminder: basics Classification Injection route and motive
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Short notes on webpage programming languages
Short notes on webpage programming languages What is HTML? HTML is a language for describing web pages. HTML stands for Hyper Text Markup Language HTML is a markup language A markup language is a set of
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
A Review of Web Application Security for Preventing Cyber Crimes
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 699-704 International Research Publications House http://www. irphouse.com A Review of Web Application
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student
SQL Injection By Artem Kazanstev, ITSO and Alex Beutel, Student SANS Priority No 2 As of September 2009, Web application vulnerabilities such as SQL injection and Cross-Site Scripting flaws in open-source
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
5 Simple Steps to Secure Database Development
E-Guide 5 Simple Steps to Secure Database Development Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert
CSCI110 Exercise 4: Database - MySQL
CSCI110 Exercise 4: Database - MySQL The exercise This exercise is to be completed in the laboratory and your completed work is to be shown to the laboratory tutor. The work should be done in week-8 but
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
BLIND SQL INJECTION (UBC)
WaveFront Consulting Group BLIND SQL INJECTION (UBC) Rui Pereira,B.Sc.(Hons),CISSP,CIPS ISP,CISA,CWNA,CPTS/CPTE WaveFront Consulting Group Ltd [email protected] www.wavefrontcg.com 1 This material
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
SQL Injection. The ability to inject SQL commands into the database engine through an existing application
SQL Injection The ability to inject SQL commands into the database engine through an existing application 1 What is SQL? SQL stands for Structured Query Language Allows us to access a database ANSI and
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
White Paper. Blindfolded SQL Injection
White Paper In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, combined with various publications that explain the problem and
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Web Applications Security: SQL Injection Attack
Web Applications Security: SQL Injection Attack S. C. Kothari CPRE 556: Lecture 8, February 2, 2006 Electrical and Computer Engineering Dept. Iowa State University SQL Injection: What is it A technique
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Start Secure. Stay Secure. Blind SQL Injection. Are your web applications vulnerable? By Kevin Spett
Are your web applications vulnerable? By Kevin Spett Table of Contents Introduction 1 What is? 1 Detecting Vulnerability 2 Exploiting the Vulnerability 3 Solutions 6 The Business Case for Application Security
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
SQL Injection and XSS
SQL Injection and XSS How they work and how to stop them. Rob Kraft, [email protected] September 22, 2011 Rob Kraft www.kraftsoftware.com 1 What r hackers looking 4? Non-specific attacks Identifying vulnerable
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
