SlideShare a Scribd company logo
Web Application
Security
YOUSUF MOIN
IT SPECIALIST | TECHNOLOGY PROFESSIONAL
Point # 01
Allow the access from the trusted network and control the traffic of untrusted network with the
help of UTM box
Point # 02
Access mechanism must be encrypted
◦ Use the https protocol instead of http
◦ Use the proper SSL certificate
Point # 03
Implement two factor authentication
◦ You land on the website’s login screen and enter your username and password to request access to your
account.
◦ If you’ve only enabled two-factor authentication to activate if the request has been flagged, the system
will determine if you need to complete the additional verification step to ensure you’re not a hacker.
Point # 03
◦ A code will be sent via text message to the phone number you provided when you created the account.
During this time, you’ll be directed to a second login screen prompting you to enter the code.
◦ Once you’ve entered your passcode, the system will verify that the code you enter is the same as the
one that was sent to you.
◦ If there’s a match, you’ll be able to access your account.
Point # 04
Application design should be
External USer Internet
DMZ IPInternal Network IP
Internal User
Webpage request from Outside
Resolve from the public DNS entry that points to
the Firewall
Firewall
Allow and redirect request to only DMZ IP
Webpage request from Inside
Real time sync

More Related Content

PPTX
Computer crime
PPTX
Hacking computer crime
PPTX
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
PDF
IRJET - Secure Banking Application with Image and GPS Location
PPTX
secure and authentication using personal device ppt
PDF
The Immune System of Internet
PDF
Fraud Analytics Techniques Moving Into Security
PPTX
"Bypassing two factor authentication", Shahmeer Amir
Computer crime
Hacking computer crime
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
IRJET - Secure Banking Application with Image and GPS Location
secure and authentication using personal device ppt
The Immune System of Internet
Fraud Analytics Techniques Moving Into Security
"Bypassing two factor authentication", Shahmeer Amir

Similar to Web application security (20)

PPTX
Two factor authentication end user guide
PPTX
Two factor authentication.pptx
PDF
How to Find and Fix Broken Authentication Vulnerability
PDF
INSTAGRAM – HACKING AND PREVENTION TIPS
PDF
Two factor authentication_procedure
PDF
How to Implement Website Authentication By MyOtpApp
DOCX
Digital signature
PDF
120 i143
PDF
How LoginRadius Secures Smart and IoT Authentication
PPTX
E-commerce-Security-_20250212_131135_0000.pptx
PPT
Two way authentication
PPT
Two way authentication
PDF
E-Business security
PPTX
Keylogging resistant visual authentication Protocols
PPTX
Web application security part 02
PPTX
How to use microsoft authenticator app
PPTX
E commerce security
PDF
free blogger templates documents based on knowledge
PDF
Iaetsd vulnerabilities in credit card security
PDF
Web Authn & Security Keys: Unlocking the Key to Authentication
Two factor authentication end user guide
Two factor authentication.pptx
How to Find and Fix Broken Authentication Vulnerability
INSTAGRAM – HACKING AND PREVENTION TIPS
Two factor authentication_procedure
How to Implement Website Authentication By MyOtpApp
Digital signature
120 i143
How LoginRadius Secures Smart and IoT Authentication
E-commerce-Security-_20250212_131135_0000.pptx
Two way authentication
Two way authentication
E-Business security
Keylogging resistant visual authentication Protocols
Web application security part 02
How to use microsoft authenticator app
E commerce security
free blogger templates documents based on knowledge
Iaetsd vulnerabilities in credit card security
Web Authn & Security Keys: Unlocking the Key to Authentication
Ad

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Spectral efficient network and resource selection model in 5G networks
Ad

Web application security

  • 1. Web Application Security YOUSUF MOIN IT SPECIALIST | TECHNOLOGY PROFESSIONAL
  • 2. Point # 01 Allow the access from the trusted network and control the traffic of untrusted network with the help of UTM box
  • 3. Point # 02 Access mechanism must be encrypted ◦ Use the https protocol instead of http ◦ Use the proper SSL certificate
  • 4. Point # 03 Implement two factor authentication ◦ You land on the website’s login screen and enter your username and password to request access to your account. ◦ If you’ve only enabled two-factor authentication to activate if the request has been flagged, the system will determine if you need to complete the additional verification step to ensure you’re not a hacker.
  • 5. Point # 03 ◦ A code will be sent via text message to the phone number you provided when you created the account. During this time, you’ll be directed to a second login screen prompting you to enter the code. ◦ Once you’ve entered your passcode, the system will verify that the code you enter is the same as the one that was sent to you. ◦ If there’s a match, you’ll be able to access your account.
  • 6. Point # 04 Application design should be External USer Internet DMZ IPInternal Network IP Internal User Webpage request from Outside Resolve from the public DNS entry that points to the Firewall Firewall Allow and redirect request to only DMZ IP Webpage request from Inside Real time sync