SlideShare a Scribd company logo
Protect your websites from
cyber attacks
April 27, 2017
HOWTO: Protect your websites/apps from cyber attacks
Overview
Security plugins for Drupal and
Wordpress
Write code with security in mind
Firewall
Operating system security
Web stack security
Protect your user/client
Questions and Answer
State of Cybersecurity
The completely secure system doesn’t exist
Balance between security and convenience
State of Cybersecurity
Really effective
security plugins
for Drupal and
WordPress
Drupal
Security Module
https://www.drupal.org/project/se
curity
WordPress
Wordfence
https://www.wordfence.com
Demo
Always write code with
security in mind
Bad Example:
Uoft.me
alumni.utoronto.ca/?redir=http://
uoftimpactsurvey.ca
● Use both front-end and back-end
input validation
● Always sanitize and escape user
input (mysqli_real_escape_string)
● Always escape the output
Firewall
Must install a firewall
Enable it and properly configure
it.
Allow all IPs to access certain
ports (80, 443)
Allow certain IPs to access
specific ports (22)
HOWTO: Protect your websites/apps from cyber attacks
Operating
System
security
Two-factor authentication
Use SSH and SFTP instead of
regular FTP
Use regular user accounts
Keep your OS up-to-date
Install security patches
Edit /etc/hosts.allow file
HOWTO: Protect your websites/apps from cyber attacks
Web stack
security
Web Server
Check config settings
Enable access log and error log
Back up log files
Force HTTPS
SQL Database
Prevent SQL injection
do not allow user input to be used in
creating your SQL query
HOWTO: Protect your websites/apps from cyber attacks
Protect your
end-users /
clients
Protect your end-users also
protects you
Encrypt the connections between
you and your user
Encrypt cookies, session
variables, local storage, etc
Make sure your app / site is
standard compliant
Secure OS Secure DB
Web
server
Secure
code
Firewall
HOWTO: Protect your websites/apps from cyber attacks
Resources
WordPress
● WPScan Vulnerability Database: https://wpvulndb.com/
● National Vulnerability Database: https://nvd.nist.gov/home
● Wordfence: https://www.wordfence.com/
Drupal
● Make sure your contrib / core is up-to-date
● Seckit: https://www.drupal.org/project/seckit
● Security Review: https://www.drupal.org/project/security_review
● Security Advisories: https://www.drupal.org/security
● Cybersecurity Best Practices: https://www.cisecurity.org/cybersecurity-best-practices/
● Center for Internet Security: https://www.cisecurity.org/
● Ubuntu Server Benchmark:
https://benchmarks.cisecurity.org/tools2/linux/CIS_Ubuntu_14.04_LTS_Server_Benchmark_v1.0.0.pdf
Questions?

More Related Content

PDF
WordPress Security 2018
PDF
Reversing & malware analysis training part 1 lab setup guide
PDF
Manage Artifact Versioning, Security and Compliance
ODP
Securing Your Moodle
PPT
Web Security Programming I I
PPTX
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
PPT
BeStorm Introduction
PPTX
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
WordPress Security 2018
Reversing & malware analysis training part 1 lab setup guide
Manage Artifact Versioning, Security and Compliance
Securing Your Moodle
Web Security Programming I I
WordPress Security Implementation Guideline - Presentation for OWASP Romania ...
BeStorm Introduction
Dan Catalin Vasile - Hacking the Wordpress Ecosystem

What's hot (18)

PPTX
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
PPTX
Anatomy of Exploit Kits
PPTX
Reversing malware analysis training part7 unpackingupx
PDF
Reversing & malware analysis training part 7 unpacking upx
PDF
Identity Security - Azure Identity Protection
PPTX
WordPress Security - What to do, What NOT to do
PDF
Mod Security
DOCX
Bypassing cisco’s sourcefire amp endpoint solution – full demo
PDF
Should you be using WordPress as your web platform?
KEY
mod_security introduction at study2study #3
PDF
Reversing & malware analysis training part 10 exploit development basics
PPTX
Reversing & malware analysis training part 1 lab setup guide
PPTX
Reversing malware analysis training part1 lab setup guide
PPT
WordPress in the enterprise - can it work?
PPT
WordPress Security Hardening
PDF
10 Steps to Secure Wordpress Sites
PPTX
Venkasure Antivirus Pro
PPTX
Dll preloading-attack
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Anatomy of Exploit Kits
Reversing malware analysis training part7 unpackingupx
Reversing & malware analysis training part 7 unpacking upx
Identity Security - Azure Identity Protection
WordPress Security - What to do, What NOT to do
Mod Security
Bypassing cisco’s sourcefire amp endpoint solution – full demo
Should you be using WordPress as your web platform?
mod_security introduction at study2study #3
Reversing & malware analysis training part 10 exploit development basics
Reversing & malware analysis training part 1 lab setup guide
Reversing malware analysis training part1 lab setup guide
WordPress in the enterprise - can it work?
WordPress Security Hardening
10 Steps to Secure Wordpress Sites
Venkasure Antivirus Pro
Dll preloading-attack
Ad

Similar to HOWTO: Protect your websites/apps from cyber attacks (20)

PPTX
Anatomy of a Build Pipeline
PPTX
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
PPTX
7 Ways to Stay 7 Years Ahead of the Threat
PDF
Drupal Security Basics for the DrupalJax January Meetup
PDF
Tips on Securing Drupal Sites
PPT
Quick Tips for Server Security
PPTX
Security misconfiguration
PDF
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
PPTX
Penetration testing dont just leave it to chance
PDF
WordPress Architecture for Tech-Savvy Managers
PPTX
OWASP_Top_Ten_Proactive_Controls_v2.pptx
PPTX
Windows azure overview for SharePoint Pros
PDF
Doing Drupal security right
PPTX
Making Security Agile
PPTX
VB2013 - Security Research and Development Framework
PPTX
Locking down word press
PDF
DevOpsDays Singapore - Continuous Auditing with Compliance as Code
PDF
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
Microsoft Operating System Vulnerabilities
Anatomy of a Build Pipeline
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
7 Ways to Stay 7 Years Ahead of the Threat
Drupal Security Basics for the DrupalJax January Meetup
Tips on Securing Drupal Sites
Quick Tips for Server Security
Security misconfiguration
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Penetration testing dont just leave it to chance
WordPress Architecture for Tech-Savvy Managers
OWASP_Top_Ten_Proactive_Controls_v2.pptx
Windows azure overview for SharePoint Pros
Doing Drupal security right
Making Security Agile
VB2013 - Security Research and Development Framework
Locking down word press
DevOpsDays Singapore - Continuous Auditing with Compliance as Code
Tips on Securing Drupal Sites - DrupalCamp Atlanta (DCA)
Ch08 Microsoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Ad

Recently uploaded (20)

PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Introduction to the IoT system, how the IoT system works
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPT
tcp ip networks nd ip layering assotred slides
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Internet___Basics___Styled_ presentation
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction to the IoT system, how the IoT system works
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
tcp ip networks nd ip layering assotred slides
Testing WebRTC applications at scale.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
WebRTC in SignalWire - troubleshooting media negotiation
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Sims 4 Historia para lo sims 4 para jugar
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
522797556-Unit-2-Temperature-measurement-1-1.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
presentation_pfe-universite-molay-seltan.pptx
The Internet -By the Numbers, Sri Lanka Edition
Internet___Basics___Styled_ presentation

HOWTO: Protect your websites/apps from cyber attacks

  • 1. Protect your websites from cyber attacks April 27, 2017
  • 3. Overview Security plugins for Drupal and Wordpress Write code with security in mind Firewall Operating system security Web stack security Protect your user/client Questions and Answer
  • 4. State of Cybersecurity The completely secure system doesn’t exist Balance between security and convenience
  • 6. Really effective security plugins for Drupal and WordPress Drupal Security Module https://www.drupal.org/project/se curity WordPress Wordfence https://www.wordfence.com
  • 8. Always write code with security in mind
  • 10. ● Use both front-end and back-end input validation ● Always sanitize and escape user input (mysqli_real_escape_string) ● Always escape the output
  • 11. Firewall Must install a firewall Enable it and properly configure it. Allow all IPs to access certain ports (80, 443) Allow certain IPs to access specific ports (22)
  • 13. Operating System security Two-factor authentication Use SSH and SFTP instead of regular FTP Use regular user accounts Keep your OS up-to-date Install security patches Edit /etc/hosts.allow file
  • 15. Web stack security Web Server Check config settings Enable access log and error log Back up log files Force HTTPS SQL Database Prevent SQL injection do not allow user input to be used in creating your SQL query
  • 17. Protect your end-users / clients Protect your end-users also protects you Encrypt the connections between you and your user Encrypt cookies, session variables, local storage, etc Make sure your app / site is standard compliant
  • 18. Secure OS Secure DB Web server Secure code Firewall
  • 20. Resources WordPress ● WPScan Vulnerability Database: https://wpvulndb.com/ ● National Vulnerability Database: https://nvd.nist.gov/home ● Wordfence: https://www.wordfence.com/ Drupal ● Make sure your contrib / core is up-to-date ● Seckit: https://www.drupal.org/project/seckit ● Security Review: https://www.drupal.org/project/security_review ● Security Advisories: https://www.drupal.org/security ● Cybersecurity Best Practices: https://www.cisecurity.org/cybersecurity-best-practices/ ● Center for Internet Security: https://www.cisecurity.org/ ● Ubuntu Server Benchmark: https://benchmarks.cisecurity.org/tools2/linux/CIS_Ubuntu_14.04_LTS_Server_Benchmark_v1.0.0.pdf