SlideShare a Scribd company logo
Sense of Security Pty Ltd
                                                       (ABN 14 098 237 908)
                                                              306, 66 King St
                                                           Sydney NSW 2000
                                                                    Australia
                                                      Tel: +61 (0)2 9290 4444
                                                      Fax: +61 (0)2 9290 4455
                                                 info@senseofsecurity.com.au




                              Managing and Securing
                                    Web 2.0
                                  4 March 2009




1   www.senseofsecurity.com                                Thursday, March 05, 2009
What is Web 2.0?

• Web 2.0 refers to today’s “second generation” of Web technologies
    – includes AJAX, RSS feeds, online forums, and mashups.


• In general Web 2.0 covers broader development trends:
    – Rich Internet Applications (RIA): Feature rich web sites; mimic thick client
      applications.

    – Collaboration and Participation: Generating and sharing content in real
      time; wikis, extranets, blogs, social networking sites, online forums.

    – Syndication: RSS or Atom feeds and mashups. Broadcasting of data.




2   www.senseofsecurity.com                                             Thursday, March 05, 2009
Look familiar?

                                              Instant Messaging        RSS
           Social Networks




                  Tagging
                                  Personalised Home Pages           Widgets




    Source: Worklight


3       www.senseofsecurity.com                                               Thursday, March 05, 2009
Why should you care about Web 2.0?

• Consumer (i.e. "Web 2.0") technologies are already finding their way
  into the enterprise.
    – Employees use (sanctioned and unsanctioned) consumer tools to perform
      day-to-day business tasks
    – Enterprise applications use consumer technologies to provide the latest
      and greatest in usability and functionality
    – Examples include: instant messaging, blogs, mashups, wikis


• ……..and Web Applications are the focus of attacks
    – Web applications in general have become the Achilles heel of Corporate IT
      Security.
    – Nearly 55% of all vulnerability disclosures in 2008 affect Web applications
    – SQL injection jumped 134 percent and replaced cross-site scripting as the
      predominant type of Web application vulnerability (several hundred
      thousand per day at the end of 2008).
      (Source IBM)

4   www.senseofsecurity.com                                            Thursday, March 05, 2009
It’s real




• 78% of IT organizations are concerned about the risks of employee-
  driven, unsanctioned use of Web 2.0 tools and technologies
    Source: Forrester Research


• 50% of respondents said they "customize their work environment
  moderately or aggressively" (including the use of unsanctioned tools)
  and will continue to do so.
    Source: Gartner Research poll




5   www.senseofsecurity.com                                     Thursday, March 05, 2009
Awareness




• One of the objectives of this seminar
    – Generate awareness around the secure use of Web 2.0 services and
      technologies to do business (because you can do it securely)
    – Present valuable information about the risks associated with the use of
      Web 2.0 services and technologies for business (because you should be
      careful)




6   www.senseofsecurity.com                                            Thursday, March 05, 2009
Web 2.0 Security Issues

• The main security issues that must be addressed include the following:
    –    User Authentication
    –    Access control (authorisation)
    –    Data security
    –    Credential security
    –    Client security
    –    Acceptable use of new tools, such as:
            •   RSS
            •   Instant messaging
            •   Blogs
            •   Wikis
            •   Bookmarking and tagging
            •   Personalised homepages
            •   Social networks




7   www.senseofsecurity.com                                      Thursday, March 05, 2009
Different, but same same




    While Web 2.0 sites may have some fancy user interfaces and provide
    the ability to interact and share information in new ways, the
    principles guiding secure development, deployment and maintenance
    remain the same as traditional web methods.




8    www.senseofsecurity.com                                    Thursday, March 05, 2009
RIA Threats

    • RIA’s push application logic to the client
            – Can include access controls and session management.
            – Client code is easily manipulated by attackers
            – Flash, AJAX, Java (can be decompiled on client side)
    • Server methods are exposed
            – Servers need to interact more openly with clients
            – Provides another attack vector and larger attack footprint
    • XML data response is processed directly by JavaScript
            – Increases the threat of Cross-Site Scripting (XSS) and Cross-Site Request
              Forgery (CSRF) attacks.
    • Large number of small modules
            – Every module is potential target for attack, in total representing a larger
              attack footprint
            – State tracking and validation issues for modules that work with shared
              parameters.
Ref: Imperva Inc


     9      www.senseofsecurity.com                                              Thursday, March 05, 2009
Mitigating RIA Threats

• Separate data from application code
     – Use separate modules for generating display structures and filling in
       content.
• Do not directly execute XML data as script
     – Do not use the JavaScript eval method to render XML data.
• Encode all XML data
     – This prevents many types of attacks, from XSS to SQL injection, because
       dangerous characters like brackets, quotes, and ampersands are
       interpreted by the browser and the application server as harmless
       character strings.
• Never use client side code to perform security related tasks.
• Always validate input at the server.
• Always apply access controls and session management at the server.




10   www.senseofsecurity.com                                             Thursday, March 05, 2009
Collaboration Threats

Current problems exists because sites allow users to

• Contribute malicious HTML
     – Eg scripts and page redirects
• Upload malicious files
     – Worms and viruses.




11   www.senseofsecurity.com                             Thursday, March 05, 2009
Mitigating Collaboration Threats

• Encode all data
     – All user-supplied data displayed to other users should always be encoded.
       Encoding user data ensures that this data is interpreted by the client as
       plain text, not dangerous scripts.
• Automated user input validation
     – Validate all of the data to prevent script injection, file inclusion, command
       injection and other attacks. All of the validation should be performed at
       the server side.
• Prevent malicious users from posting viruses and malware
     – Restrict the types of files that users can upload to known, accepted file
       formats like GIF images.




12   www.senseofsecurity.com                                              Thursday, March 05, 2009
Syndication Threats

    • Syndicated data like RSS feeds and mashups present multiple threats.
    • Malicious content can invoke client side vulnerabilities.
            – Vulnerabilities include buffer overflows and client side execution.
    • Local zone attacks
            – Many RSS readers translate RSS feeds to HTML and then store the HTML
              files on the local disk, users are even more exposed to dangerous exploits.
    • Lack of transparency
            – difficult for end users to identify the initial source of data. Data may
              originate from multiple sources and be proxied, parsed, and aggregated
              before being displayed in the Web browser. This lack of transparency opens
              up the door for malicious script injections and other client side attacks.
    • Unknown data sources
            – Companies that republish content from external sites can inadvertently
              spread attacks


Ref: Imperva Inc


    13      www.senseofsecurity.com                                             Thursday, March 05, 2009
Mitigating Syndication Threats

• Sanitise dangerous content
     – Do not distribute unknown scripts, files, and HTML markup
• Select upstream content providers carefully.
     – Evaluate the integrity and the security of external sites before republishing
       third party data.
• Keep up-to-date (or seek regular expert advice)
     – Know the vulnerabilities associated with the various RSS readers. If a
       content provider is hacked, then sites that republish the content providers’
       data must either strip the malicious content or find alternative data
       sources.




14   www.senseofsecurity.com                                             Thursday, March 05, 2009
Top Web 2.0 Threats


        Web 2.0 is different but still the same ….

        1. Insufficient Authentication Controls
        2. Cross Site Scripting (XSS)
        3. Cross Site Request Forgery (CSRF)
        4. Phishing
        5. Information Leakage
        6. Injection Flaws
        7. Information Integrity
        8. Insufficient Anti-automation


        Secure Enterprise 2.0 Forum 2009




15   www.senseofsecurity.com                                   Thursday, March 05, 2009
What should you be concerned about?




• Which technologies are acceptable for enterprise use?
• How can organisations best leverage these new technologies to do
  more business while minimising risk?
• What are the rules for acceptable use of Web 2.0 technologies and how
  can they be enforced?
• When facing the collaborative nature of Web 2.0 tools and
  technologies, how can organisations maintain current levels of
  information security?




16   www.senseofsecurity.com                                  Thursday, March 05, 2009
Thank You




                                      Thank You

                                Sense of Security Pty Ltd
                                  Tel: +61 2 9290 4444
                               info@senseofsecurity.com
                               www.senseofsecurity.com




17   www.senseofsecurity.com                                   Thursday, March 05, 2009

More Related Content

PDF
Cloud security Deep Dive 2011
PDF
Mitigating Web 2.0 Threats
PDF
Watch Guard Reputation Enabled Defense (White Paper)Dna
PDF
State of Internet 2H 2008
PDF
Product Innovation Award 2009
PDF
Finjan Vital Security for Web datasheet
PDF
Web security 2012
PDF
Wsg datasheet
Cloud security Deep Dive 2011
Mitigating Web 2.0 Threats
Watch Guard Reputation Enabled Defense (White Paper)Dna
State of Internet 2H 2008
Product Innovation Award 2009
Finjan Vital Security for Web datasheet
Web security 2012
Wsg datasheet

What's hot (20)

PPTX
Cyber security
PPTX
Web Security Training
PDF
Akamai___WebSecurity_eBook_Final
PDF
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
PPT
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PPTX
Web Security
PDF
Ijnsa050215
PDF
Web Security: A Primer for Developers
PPTX
Methods Hackers Use
PDF
Invited Talk - Cyber Security and Open Source
PDF
Elementary-Information-Security-Practices
PPTX
History of Content Security: Take 2 - ShareCloudSummit Houston
PDF
Cybercriminals and security attacks
PDF
Chapter 2 konsep dasar keamanan
PDF
Cloud mz cto_roundtable
PDF
Overview of Information Security & Privacy
PPTX
Smart Protection Network
PPTX
Social media security
PDF
2016 CYBERSECURITY PLAYBOOK
PPTX
Security risks awareness
Cyber security
Web Security Training
Akamai___WebSecurity_eBook_Final
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
Web Security
Ijnsa050215
Web Security: A Primer for Developers
Methods Hackers Use
Invited Talk - Cyber Security and Open Source
Elementary-Information-Security-Practices
History of Content Security: Take 2 - ShareCloudSummit Houston
Cybercriminals and security attacks
Chapter 2 konsep dasar keamanan
Cloud mz cto_roundtable
Overview of Information Security & Privacy
Smart Protection Network
Social media security
2016 CYBERSECURITY PLAYBOOK
Security risks awareness
Ad

Similar to Managing and Securing Web 2.0 (20)

PDF
Addressing Security Challenges of Mobility and Web 2.0 2009
PDF
OWASP Top Ten in Practice
PPTX
Social networks security risks
PDF
No Website Left Behind: Are We Making Web Security Only for the Elite?
PDF
Things that go bump on the web - Web Application Security
PDF
TS-5358
PDF
TS-5358
PPT
Penetration Testing Basics
PPTX
Web 2.0 Presentation
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PDF
IDC Report : Web Security
KEY
Privacy security
PDF
Web 20 Security Defending Ajax Ria And Soa Shreeraj Shah
PDF
גיא אילון Websense
PPTX
IBM Smarter Business 2012 - IBM Security: Threat landscape
KEY
EISA Considerations for Web Application Security
PDF
Rich Web App Security - Keeping your application safe
PDF
Insecure mag-19
PPT
Security communication
PDF
Do You Write Secure Code? by Erez Metula
Addressing Security Challenges of Mobility and Web 2.0 2009
OWASP Top Ten in Practice
Social networks security risks
No Website Left Behind: Are We Making Web Security Only for the Elite?
Things that go bump on the web - Web Application Security
TS-5358
TS-5358
Penetration Testing Basics
Web 2.0 Presentation
Web Application Testing for Today’s Biggest and Emerging Threats
IDC Report : Web Security
Privacy security
Web 20 Security Defending Ajax Ria And Soa Shreeraj Shah
גיא אילון Websense
IBM Smarter Business 2012 - IBM Security: Threat landscape
EISA Considerations for Web Application Security
Rich Web App Security - Keeping your application safe
Insecure mag-19
Security communication
Do You Write Secure Code? by Erez Metula
Ad

More from Jason Edelstein (9)

PDF
Sense of Security Best practice strategies to improve your enterprise security
PDF
Sense of security - Virtualisation Security for Regulated Environments
PDF
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
PDF
PCI What When AISA Sydney 2009
PDF
PCI Compliance a Business Issue Isaca 2009
PDF
PCI Compliance What Does This Mean For the Australian Market Place 2007
PDF
Achieving PCI Compliance Long And Short Term Strategies 2009
PDF
Virtualisation: Pitfalls in Corporate VMware Implementations
PDF
VoIP: Attacks & Countermeasures in the Corporate World
Sense of Security Best practice strategies to improve your enterprise security
Sense of security - Virtualisation Security for Regulated Environments
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
PCI What When AISA Sydney 2009
PCI Compliance a Business Issue Isaca 2009
PCI Compliance What Does This Mean For the Australian Market Place 2007
Achieving PCI Compliance Long And Short Term Strategies 2009
Virtualisation: Pitfalls in Corporate VMware Implementations
VoIP: Attacks & Countermeasures in the Corporate World

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Teaching material agriculture food technology

Managing and Securing Web 2.0

  • 1. Sense of Security Pty Ltd (ABN 14 098 237 908) 306, 66 King St Sydney NSW 2000 Australia Tel: +61 (0)2 9290 4444 Fax: +61 (0)2 9290 4455 info@senseofsecurity.com.au Managing and Securing Web 2.0 4 March 2009 1 www.senseofsecurity.com Thursday, March 05, 2009
  • 2. What is Web 2.0? • Web 2.0 refers to today’s “second generation” of Web technologies – includes AJAX, RSS feeds, online forums, and mashups. • In general Web 2.0 covers broader development trends: – Rich Internet Applications (RIA): Feature rich web sites; mimic thick client applications. – Collaboration and Participation: Generating and sharing content in real time; wikis, extranets, blogs, social networking sites, online forums. – Syndication: RSS or Atom feeds and mashups. Broadcasting of data. 2 www.senseofsecurity.com Thursday, March 05, 2009
  • 3. Look familiar? Instant Messaging RSS Social Networks Tagging Personalised Home Pages Widgets Source: Worklight 3 www.senseofsecurity.com Thursday, March 05, 2009
  • 4. Why should you care about Web 2.0? • Consumer (i.e. "Web 2.0") technologies are already finding their way into the enterprise. – Employees use (sanctioned and unsanctioned) consumer tools to perform day-to-day business tasks – Enterprise applications use consumer technologies to provide the latest and greatest in usability and functionality – Examples include: instant messaging, blogs, mashups, wikis • ……..and Web Applications are the focus of attacks – Web applications in general have become the Achilles heel of Corporate IT Security. – Nearly 55% of all vulnerability disclosures in 2008 affect Web applications – SQL injection jumped 134 percent and replaced cross-site scripting as the predominant type of Web application vulnerability (several hundred thousand per day at the end of 2008). (Source IBM) 4 www.senseofsecurity.com Thursday, March 05, 2009
  • 5. It’s real • 78% of IT organizations are concerned about the risks of employee- driven, unsanctioned use of Web 2.0 tools and technologies Source: Forrester Research • 50% of respondents said they "customize their work environment moderately or aggressively" (including the use of unsanctioned tools) and will continue to do so. Source: Gartner Research poll 5 www.senseofsecurity.com Thursday, March 05, 2009
  • 6. Awareness • One of the objectives of this seminar – Generate awareness around the secure use of Web 2.0 services and technologies to do business (because you can do it securely) – Present valuable information about the risks associated with the use of Web 2.0 services and technologies for business (because you should be careful) 6 www.senseofsecurity.com Thursday, March 05, 2009
  • 7. Web 2.0 Security Issues • The main security issues that must be addressed include the following: – User Authentication – Access control (authorisation) – Data security – Credential security – Client security – Acceptable use of new tools, such as: • RSS • Instant messaging • Blogs • Wikis • Bookmarking and tagging • Personalised homepages • Social networks 7 www.senseofsecurity.com Thursday, March 05, 2009
  • 8. Different, but same same While Web 2.0 sites may have some fancy user interfaces and provide the ability to interact and share information in new ways, the principles guiding secure development, deployment and maintenance remain the same as traditional web methods. 8 www.senseofsecurity.com Thursday, March 05, 2009
  • 9. RIA Threats • RIA’s push application logic to the client – Can include access controls and session management. – Client code is easily manipulated by attackers – Flash, AJAX, Java (can be decompiled on client side) • Server methods are exposed – Servers need to interact more openly with clients – Provides another attack vector and larger attack footprint • XML data response is processed directly by JavaScript – Increases the threat of Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks. • Large number of small modules – Every module is potential target for attack, in total representing a larger attack footprint – State tracking and validation issues for modules that work with shared parameters. Ref: Imperva Inc 9 www.senseofsecurity.com Thursday, March 05, 2009
  • 10. Mitigating RIA Threats • Separate data from application code – Use separate modules for generating display structures and filling in content. • Do not directly execute XML data as script – Do not use the JavaScript eval method to render XML data. • Encode all XML data – This prevents many types of attacks, from XSS to SQL injection, because dangerous characters like brackets, quotes, and ampersands are interpreted by the browser and the application server as harmless character strings. • Never use client side code to perform security related tasks. • Always validate input at the server. • Always apply access controls and session management at the server. 10 www.senseofsecurity.com Thursday, March 05, 2009
  • 11. Collaboration Threats Current problems exists because sites allow users to • Contribute malicious HTML – Eg scripts and page redirects • Upload malicious files – Worms and viruses. 11 www.senseofsecurity.com Thursday, March 05, 2009
  • 12. Mitigating Collaboration Threats • Encode all data – All user-supplied data displayed to other users should always be encoded. Encoding user data ensures that this data is interpreted by the client as plain text, not dangerous scripts. • Automated user input validation – Validate all of the data to prevent script injection, file inclusion, command injection and other attacks. All of the validation should be performed at the server side. • Prevent malicious users from posting viruses and malware – Restrict the types of files that users can upload to known, accepted file formats like GIF images. 12 www.senseofsecurity.com Thursday, March 05, 2009
  • 13. Syndication Threats • Syndicated data like RSS feeds and mashups present multiple threats. • Malicious content can invoke client side vulnerabilities. – Vulnerabilities include buffer overflows and client side execution. • Local zone attacks – Many RSS readers translate RSS feeds to HTML and then store the HTML files on the local disk, users are even more exposed to dangerous exploits. • Lack of transparency – difficult for end users to identify the initial source of data. Data may originate from multiple sources and be proxied, parsed, and aggregated before being displayed in the Web browser. This lack of transparency opens up the door for malicious script injections and other client side attacks. • Unknown data sources – Companies that republish content from external sites can inadvertently spread attacks Ref: Imperva Inc 13 www.senseofsecurity.com Thursday, March 05, 2009
  • 14. Mitigating Syndication Threats • Sanitise dangerous content – Do not distribute unknown scripts, files, and HTML markup • Select upstream content providers carefully. – Evaluate the integrity and the security of external sites before republishing third party data. • Keep up-to-date (or seek regular expert advice) – Know the vulnerabilities associated with the various RSS readers. If a content provider is hacked, then sites that republish the content providers’ data must either strip the malicious content or find alternative data sources. 14 www.senseofsecurity.com Thursday, March 05, 2009
  • 15. Top Web 2.0 Threats Web 2.0 is different but still the same …. 1. Insufficient Authentication Controls 2. Cross Site Scripting (XSS) 3. Cross Site Request Forgery (CSRF) 4. Phishing 5. Information Leakage 6. Injection Flaws 7. Information Integrity 8. Insufficient Anti-automation Secure Enterprise 2.0 Forum 2009 15 www.senseofsecurity.com Thursday, March 05, 2009
  • 16. What should you be concerned about? • Which technologies are acceptable for enterprise use? • How can organisations best leverage these new technologies to do more business while minimising risk? • What are the rules for acceptable use of Web 2.0 technologies and how can they be enforced? • When facing the collaborative nature of Web 2.0 tools and technologies, how can organisations maintain current levels of information security? 16 www.senseofsecurity.com Thursday, March 05, 2009
  • 17. Thank You Thank You Sense of Security Pty Ltd Tel: +61 2 9290 4444 info@senseofsecurity.com www.senseofsecurity.com 17 www.senseofsecurity.com Thursday, March 05, 2009