SlideShare a Scribd company logo
The OWASP Foundation
http://www.owasp.org
Security of the
Internet
Kerala 2014
Rajesh P
Board Member OWASP Kerala
Copyright © The OWASP Foundation
Permission is granted to copy, distribute and/or modify the document under the terms of the OWASP License
The OWASP Foundation
http://www.owasp.org
Computer Security Day
Observed on November 30th
Started in 1988
Help raise awareness of computer
related security issues
2
The OWASP Foundation
http://www.owasp.org
Computer Security
Day Activities
• Change your password
• Update anti-virus and Check for viruses
• Cleanup up your computer and surroundings
• Back-up your data
• Verify your inventory of computer utilities
and packaged software
• Monitor Event Logs
• Register and pay for all commercial software
that is used on your computer
3
The OWASP Foundation
http://www.owasp.org
- Large-scale intelligence activities targeting
Internet communication
- Attempts to undermine cryptographic
algorithms
- People, companies and governments
intentionally introduce defects or
vulnerabilities (or secret back-doors)
compromising the security, trust and
integrity of software and applications
Trends related to Security in
Internet
4
The OWASP Foundation
http://www.owasp.org
- Deep Web
- Firmware
- Ransomware
- POS Malware
- Steganography
Trends related to Security in
Internet
5
Age of Application
Security
Age of Network
Security
Age of Anti-
Virus
• 3 out of 4 web sites are vulnerable to
attacks (Source: Gartner)
• 75% of Attacks at the Application Layer
(Source: Gartner)
• Important % of sales via the Web
(Services, Shop On Line, Self-care)
The OWASP Foundation
http://www.owasp.orgThe Numbers
Cyber Crime:
“Second cause of economic crime experienced by the financial
services sector” – PwC
“Globally, every second, 18 adults become victims of
cybercrime” - Norton
US - $20.7 billion – (direct losses)
Globally 2012 - $110,000,000,000 – direct losses
“556 million adults across the world have first-hand experience of cybercrime --
more than the entire population of the European Union.”
6
The OWASP Foundation
http://www.owasp.org
Target's December 19 disclosure 100+ million payment cards
LoyaltyBuild November disclosure 1.5 million + records
Snapchat: 4.6 million
user records
7
The OWASP Foundation
http://www.owasp.org
Two weeks of ethical
hacking
Ten man-years of
development
An inconvenient truth
8
The OWASP Foundation
http://www.owasp.org
Make this more difficult: Lets change the application code once a month.
9
The OWASP Foundation
http://www.owasp.org
Application
Code
COTS
(Commercial off
the shelf
Outsourced
development
Sub-
Contractors
Bespoke
outsourced
development
Bespoke Internal
development
Third Party
API’s
Third Party
Components
& Systems
Degrees of trust
You may not let some of the people who have developed your code into your offices!!
More LESS
10
The OWASP Foundation
http://www.owasp.org
2012/13 Study of 31 popular open source
libraries
- 19.8 million (26%) of the library
downloads have known vulnerabilities
- Today's applications may use up to 30 or
more libraries - 80% of the codebase
Dependencies
11
The OWASP Foundation
http://www.owasp.org
The Open Web Application Security Project (OWASP) is dedicated to
finding and fighting the causes of insecure software. The OWASP
Foundation is a 501c3 not-for-profit charitable organization that
ensures the on going availability and support for our work.
Participation in OWASP is free and open to all.
Everything here is free and open source and vendor neutral.
Main objectives: producing tools, standards and documentations
related to Web Application Security.
Thousands active members, hundreds of local chapters in the world
12
The OWASP Foundation
http://www.owasp.org
13
OWASP Mission
To make application security
"visible," so that people and
organizations can make
informed decisions about
application security risks
The OWASP Foundation
http://www.owasp.org
Making Security Visible , through…
Documentation
Top Ten, Dev. Guide, Design Guide, Testing Guide, …
Tools
WebGoat, WebScarab, ESAPI, CSRF Guard, Zed Attack Proxy (ZAP), …
Working Groups
Browser Security, Industry Sectors, Education, Mobile Phone Security,
Preventive Security, OWASP Governance
Security Community and Awareness
Local Chapters, Conferences, Mailing Lists
14
PROTECT
DETECT
LIFE CYCLE
The OWASP Foundation
http://www.owasp.org
Body of
Knowledge
Core Application
Security
Knowledge Base
Acquiring and
Building
Secure
Applications
Verifying
Application
Security
Managing
Application
Security
Application
Security
Tools
AppSec
Education and
CBT
Research to
Secure New
Technologies
Principles
Threat Agents,
Attacks,
Vulnerabilities,
Impacts, and
Countermeasures
OWASP Foundation 501c3
OWASP Community Platform
(wiki, forums, mailing lists)
Projects
Chapters
AppSecConferences
Guide to Building
Secure Web
Applications and Web
Services
Guide to Application
Security Testing and
Guide to Application
Security Code Review
Tools for Scanning,
Testing, Simulating,
and Reporting Web
Application Security
Issues
Web Based Learning
Environment and
Guide for Learning
Application Security
Guidance and Tools
for Measuring and
Managing Application
Security
Research Projects to
Figure Out How to
Secure the Use of
New Technologies
(like Ajax)
15
The OWASP Foundation
http://www.owasp.org
The OWASP Enterprise
Security API
Custom Enterprise Web Application
Enterprise Security API
Authenticator
User
AccessController
AccessReferenceMap
Validator
Encoder
HTTPUtilities
Encryptor
EncryptedProperties
Randomizer
ExceptionHandling
Logger
IntrusionDetector
SecurityConfiguration
Existing Enterprise Security Services/Libraries
16
The OWASP Foundation
http://www.owasp.org
17
The OWASP Foundation
http://www.owasp.org
Please Help
OWASP Grow
Push us to do better!
Be an active contributor
Stub articles – wiki contributions
New technologies to analyze
Be an OWASP member
Corporate Members
Individual Members
Please join us and share what you know!
18
9%
41%
50%
OWASP Projects
Code
Tools
Documentation
The OWASP Foundation
http://www.owasp.org
Thank you!
rajesh.nair@owasp.or
g
https://www.facebook.com/OWASPKerala
https://www.twitter.com/owasp_kerala

More Related Content

PDF
NormShieldBrochure
PDF
Application Security Trends and Issues
PDF
WhyNormShield
PDF
What's Hot In IT - Cybersecurity
PDF
NATO Cyber Security Conference: Creating IT-Security Start-Ups
PDF
FINE-TUNE IPS TO DIAL UP SECURITY
PDF
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
PPTX
Three trends in cybersecurity
NormShieldBrochure
Application Security Trends and Issues
WhyNormShield
What's Hot In IT - Cybersecurity
NATO Cyber Security Conference: Creating IT-Security Start-Ups
FINE-TUNE IPS TO DIAL UP SECURITY
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Three trends in cybersecurity

What's hot (20)

PDF
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
PDF
The Cyber Attack Risk
DOCX
Why security is the kidney not the tail of the dog v3
PPTX
Tackling today's cyber security challenges - WISER Services & Solutions
PPTX
Security Kung Fu: Active Directory Changes
PDF
Webinar: A deep dive on ransomware
PDF
Drainware Corporate
PPTX
kill-chain-presentation-v3
PPTX
Web appsec and it’s 10 best SDLC practices
PDF
IT Security Awareness - How to?
PPTX
Protect Yourself Against Today's Cybercriminals and Hackers
PDF
Active Directory: Modern Threats, Medieval Protection
PDF
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
PDF
The Current ICS Threat Landscape
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PDF
Securing Medical Devices Using Adaptive Testing Methodologies
PPTX
Boosting IoT Protection: An Enterprise Risk Imperative
PPTX
Cyber kill chain
PPT
FERMA presentation at Parima conference
PDF
Information Security Risk Management
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
The Cyber Attack Risk
Why security is the kidney not the tail of the dog v3
Tackling today's cyber security challenges - WISER Services & Solutions
Security Kung Fu: Active Directory Changes
Webinar: A deep dive on ransomware
Drainware Corporate
kill-chain-presentation-v3
Web appsec and it’s 10 best SDLC practices
IT Security Awareness - How to?
Protect Yourself Against Today's Cybercriminals and Hackers
Active Directory: Modern Threats, Medieval Protection
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
The Current ICS Threat Landscape
Robert Hurlbut - Threat Modeling for Secure Software Design
Securing Medical Devices Using Adaptive Testing Methodologies
Boosting IoT Protection: An Enterprise Risk Imperative
Cyber kill chain
FERMA presentation at Parima conference
Information Security Risk Management
Ad

Viewers also liked (7)

PPTX
Observation & interview
PDF
Town and Country Meeting Planner Workbook
PDF
Mistakes learners make
ODP
Introduction to OWASP & Web Application Security
PPTX
Java Secure Coding Practices
PPTX
Comment démarrer sa startup
PPTX
Android pen test basics
Observation & interview
Town and Country Meeting Planner Workbook
Mistakes learners make
Introduction to OWASP & Web Application Security
Java Secure Coding Practices
Comment démarrer sa startup
Android pen test basics
Ad

Similar to Security of internet (20)

PPTX
Protección web con ESAPI y AppSensor [GuadalajaraCON 2013]
PPT
Owasp Serbia overview
PPTX
RSA Europe 2013 OWASP Training
PDF
2014 09-04-pj
PPTX
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
PPTX
Do You... Legal?
PPT
Introduction To OWASP
PPTX
Chirita ionel owasp europe tour
PDF
OWASP, the life and the universe
PPTX
Web Application Security
PDF
What are the top 10 web security risks?
PDF
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
PDF
Owasp top 10-2017
PDF
Owasp top 10 2017 (en)
PDF
OWASP_Top_10-2017_(en).pdf.pdf
PPTX
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
PDF
20160713 2016 the honeynet projct annual workshop focus and global trends
PPTX
OWASP Free Training - SF2014 - Keary and Manico
PPT
OWASP an Introduction
PPTX
ION Costa Rica Opening Slides
Protección web con ESAPI y AppSensor [GuadalajaraCON 2013]
Owasp Serbia overview
RSA Europe 2013 OWASP Training
2014 09-04-pj
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
Do You... Legal?
Introduction To OWASP
Chirita ionel owasp europe tour
OWASP, the life and the universe
Web Application Security
What are the top 10 web security risks?
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
Owasp top 10-2017
Owasp top 10 2017 (en)
OWASP_Top_10-2017_(en).pdf.pdf
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
20160713 2016 the honeynet projct annual workshop focus and global trends
OWASP Free Training - SF2014 - Keary and Manico
OWASP an Introduction
ION Costa Rica Opening Slides

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...

Security of internet

  • 1. The OWASP Foundation http://www.owasp.org Security of the Internet Kerala 2014 Rajesh P Board Member OWASP Kerala Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify the document under the terms of the OWASP License
  • 2. The OWASP Foundation http://www.owasp.org Computer Security Day Observed on November 30th Started in 1988 Help raise awareness of computer related security issues 2
  • 3. The OWASP Foundation http://www.owasp.org Computer Security Day Activities • Change your password • Update anti-virus and Check for viruses • Cleanup up your computer and surroundings • Back-up your data • Verify your inventory of computer utilities and packaged software • Monitor Event Logs • Register and pay for all commercial software that is used on your computer 3
  • 4. The OWASP Foundation http://www.owasp.org - Large-scale intelligence activities targeting Internet communication - Attempts to undermine cryptographic algorithms - People, companies and governments intentionally introduce defects or vulnerabilities (or secret back-doors) compromising the security, trust and integrity of software and applications Trends related to Security in Internet 4
  • 5. The OWASP Foundation http://www.owasp.org - Deep Web - Firmware - Ransomware - POS Malware - Steganography Trends related to Security in Internet 5 Age of Application Security Age of Network Security Age of Anti- Virus • 3 out of 4 web sites are vulnerable to attacks (Source: Gartner) • 75% of Attacks at the Application Layer (Source: Gartner) • Important % of sales via the Web (Services, Shop On Line, Self-care)
  • 6. The OWASP Foundation http://www.owasp.orgThe Numbers Cyber Crime: “Second cause of economic crime experienced by the financial services sector” – PwC “Globally, every second, 18 adults become victims of cybercrime” - Norton US - $20.7 billion – (direct losses) Globally 2012 - $110,000,000,000 – direct losses “556 million adults across the world have first-hand experience of cybercrime -- more than the entire population of the European Union.” 6
  • 7. The OWASP Foundation http://www.owasp.org Target's December 19 disclosure 100+ million payment cards LoyaltyBuild November disclosure 1.5 million + records Snapchat: 4.6 million user records 7
  • 8. The OWASP Foundation http://www.owasp.org Two weeks of ethical hacking Ten man-years of development An inconvenient truth 8
  • 9. The OWASP Foundation http://www.owasp.org Make this more difficult: Lets change the application code once a month. 9
  • 10. The OWASP Foundation http://www.owasp.org Application Code COTS (Commercial off the shelf Outsourced development Sub- Contractors Bespoke outsourced development Bespoke Internal development Third Party API’s Third Party Components & Systems Degrees of trust You may not let some of the people who have developed your code into your offices!! More LESS 10
  • 11. The OWASP Foundation http://www.owasp.org 2012/13 Study of 31 popular open source libraries - 19.8 million (26%) of the library downloads have known vulnerabilities - Today's applications may use up to 30 or more libraries - 80% of the codebase Dependencies 11
  • 12. The OWASP Foundation http://www.owasp.org The Open Web Application Security Project (OWASP) is dedicated to finding and fighting the causes of insecure software. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the on going availability and support for our work. Participation in OWASP is free and open to all. Everything here is free and open source and vendor neutral. Main objectives: producing tools, standards and documentations related to Web Application Security. Thousands active members, hundreds of local chapters in the world 12
  • 13. The OWASP Foundation http://www.owasp.org 13 OWASP Mission To make application security "visible," so that people and organizations can make informed decisions about application security risks
  • 14. The OWASP Foundation http://www.owasp.org Making Security Visible , through… Documentation Top Ten, Dev. Guide, Design Guide, Testing Guide, … Tools WebGoat, WebScarab, ESAPI, CSRF Guard, Zed Attack Proxy (ZAP), … Working Groups Browser Security, Industry Sectors, Education, Mobile Phone Security, Preventive Security, OWASP Governance Security Community and Awareness Local Chapters, Conferences, Mailing Lists 14 PROTECT DETECT LIFE CYCLE
  • 15. The OWASP Foundation http://www.owasp.org Body of Knowledge Core Application Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSecConferences Guide to Building Secure Web Applications and Web Services Guide to Application Security Testing and Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax) 15
  • 16. The OWASP Foundation http://www.owasp.org The OWASP Enterprise Security API Custom Enterprise Web Application Enterprise Security API Authenticator User AccessController AccessReferenceMap Validator Encoder HTTPUtilities Encryptor EncryptedProperties Randomizer ExceptionHandling Logger IntrusionDetector SecurityConfiguration Existing Enterprise Security Services/Libraries 16
  • 18. The OWASP Foundation http://www.owasp.org Please Help OWASP Grow Push us to do better! Be an active contributor Stub articles – wiki contributions New technologies to analyze Be an OWASP member Corporate Members Individual Members Please join us and share what you know! 18 9% 41% 50% OWASP Projects Code Tools Documentation
  • 19. The OWASP Foundation http://www.owasp.org Thank you! rajesh.nair@owasp.or g https://www.facebook.com/OWASPKerala https://www.twitter.com/owasp_kerala