SlideShare a Scribd company logo
Created By Cygnis Media
http://www.cygnismedia.com/
 Web application security is a branch of Information
Security that deals specifically with security of
websites, web applications and web services.
 At a high level, Web application security draws on
the principles of application security but applies
them specifically to Internet and Web systems.
Typically web applications are developed using
programming languages such as PHP, Java EE, Java,
Python, Ruby, ASP.NET, C#, VB.NET or Classic ASP.
 Content-Security-Policy
 X-Frame-Options
 Anti-CSRF cryptographic nonces on all secure
functions
 DAL (data/database access layer)
 Unwritable file system
 Forensically secure logging
 Secure credential/passwd/secret questions
and answers storage
 Security frameworks
 autocomplete="off" and strong passwords
 We suggest you apply this with the notifying
switched on, so that you can see what's splitting
as your devs will work on it. It can be incredibly
hard to develop into your website retroactively,
because it usually includes either including so
many whitelists that it's essentially useless, or
having to go carefully through your website to
make a large stock, expecting that you don't skip
anything along the way. There is now a
bookmarklet to help as well.
 (one time tokens tied to user sessions) into each
type and verifying that to make sure that your site
can't be compelled to execute activities. This can be
a huge pain to retrofit because it means in contact
with a data source or distributed storage on every
hit — in addition to the rule that needs to be placed
into each web page with a type and following
operate to confirm the nonce.
 We suggest building nonces (one time tokens
tied to user sessions) into each type and
verifying that to make sure that your site can't
be compelled to execute activities. This can be
a large pain to retrofit because it means in
contact with a data source or distributed
storage on every hit in addition to the rule that
needs to be placed into each web page with a
type and following operate to confirm the
nonce.
 DALs help to avoid SQLinjection. Few
organizations know about them or use them
properly, but by front side finishing all data
source with an abstraction part many types of
SQL hypodermic injection basically don't
succeed because they are not properly
established. DALs can be costly and incredibly
complicated to retrofit because every individual
data source contact needs adjustment and
interpolation at the DAL part.
 Making the website rule and webserver configs on
the computer file program unwritable by the web
customer is a large protection benefits post-
compromise. Almost no sites take this
precautionary activity but it makes many types of
exploitation nearly difficult. Retrofitting this is
difficult to do later because plenty of things usually
depend on local computer file program creates as
the site advances over time, even though this type
of style can be incredibly poor.
 Records that are sent off-host or are created
otherwise not reachable by the web customer help
avoid overwriting the computer file program,
regional consist of strikes, eliminating the
assailant's paths from the logs and so on. It's
challenging to describe how useful it is to have
untampered logs until after it's too delayed. It is
challenging to retrofit because it usually needs
creating different signing facilities and developing
some way to duplicate or instantly transportation
the logs.
 How many sites have we seen affected and all of
the information is taken? In most situations it is
either plaintext or badly hashed with an
outdated hashing criteria, like MD5. Supposing
that everything in the information source is
duplicated off, the enemy still shouldn't have
accessibility anything without investing loads of
sources to break individual series. This can be
extremely complicated to retrofit because many
site features depend on current information
source styles and the associated organized
information.
 Collections for managing and sanitising or
rejecting customer feedback (XSS, SQLi,
Control hypodermic injection, etc...)
significantly enhance your capability to
proactively secure yourself when used
consistently across the website. Collections
like this usually need modifying many
website features, and these frameworks
therefore contact almost every feedback, so
it can be a headache to develop after the
fact.
 To secure your website from incredible power and
from the latest allergy of protection problems in
autocomplete, it is a wise decision to apply both of
these. If your customers think the web browser will
keep in mind their protection passwords for them it's
going to be a headache when you convert
autocomplete="off" later. If you convert it off
beginning, they'll select poor protection passwords.
So you really need both at the same time. You don't
want the assistance expenses of all of your customers
contacting you trying to determine how to get
returning into their consideration.
Created By Cygnis Media:
http://www.cygnismedia.com/Data Collect: itproportal.com

More Related Content

PPT
Why You Need A Web Application Firewall
PPT
OWASP Serbia - A6 security misconfiguration
PDF
Benefits of Web Application Firewall
PPTX
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
PPT
OWASP Serbia - A3 broken authentication and session management
DOCX
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
PPT
OWASP Serbia - A5 cross-site request forgery
PPTX
Web Application Firewall intro
Why You Need A Web Application Firewall
OWASP Serbia - A6 security misconfiguration
Benefits of Web Application Firewall
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
OWASP Serbia - A3 broken authentication and session management
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
OWASP Serbia - A5 cross-site request forgery
Web Application Firewall intro

What's hot (20)

PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Chapter1:information security overview
PPTX
Owasp top 10 security threats
PPTX
Chapter 3: Vulnerabilities and threat models
PPTX
Owasp 2017 oveview
PPTX
Content Management System Security
PDF
Top 10 Web Application vulnerabilities
PPTX
Web Application Firewall (WAF) DAST/SAST combination
PPTX
Security For Application Development
PPTX
A5: Security Misconfiguration
PPTX
4 . future uni presentation
PPTX
Owasp top 10 2017
PPTX
Chapter4:Be The Attacker
PPTX
Chapter 6 : Attack Execution (2)
PDF
OWASP Top 10 - 2017
PPTX
OWASP Top 10 2017 - New Vulnerabilities
PDF
Owasp Top 10
PPTX
Owasp first5 presentation
PDF
OWASP TOP TEN 2017 RC1
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Chapter1:information security overview
Owasp top 10 security threats
Chapter 3: Vulnerabilities and threat models
Owasp 2017 oveview
Content Management System Security
Top 10 Web Application vulnerabilities
Web Application Firewall (WAF) DAST/SAST combination
Security For Application Development
A5: Security Misconfiguration
4 . future uni presentation
Owasp top 10 2017
Chapter4:Be The Attacker
Chapter 6 : Attack Execution (2)
OWASP Top 10 - 2017
OWASP Top 10 2017 - New Vulnerabilities
Owasp Top 10
Owasp first5 presentation
OWASP TOP TEN 2017 RC1
Ad

Viewers also liked (15)

PPT
Advocacy for pride of teachers
PPT
Akiu prieziuros patarimai paaugliams
PPTX
Showcase of pikslme's data august2013
PPT
Our global reach
PPTX
Top 10 Social Media Websites
PPT
Take it home design thinking application
PPTX
Marketing trends to watch in 2013
PPTX
Facebook help to grow business
PPTX
Design challenge brief empathize and define
ODP
MI GRAN FAMILIA
PDF
Prototype and test
PDF
How to learn chinese correctly
PPT
Prototype
PPTX
No go tell april
PDF
Maayan Cidade Jardim
Advocacy for pride of teachers
Akiu prieziuros patarimai paaugliams
Showcase of pikslme's data august2013
Our global reach
Top 10 Social Media Websites
Take it home design thinking application
Marketing trends to watch in 2013
Facebook help to grow business
Design challenge brief empathize and define
MI GRAN FAMILIA
Prototype and test
How to learn chinese correctly
Prototype
No go tell april
Maayan Cidade Jardim
Ad

Similar to Web Application Security (20)

PDF
OWASP Portland - OWASP Top 10 For JavaScript Developers
PDF
A security note for web developers
PDF
Injecting Security into Web apps at Runtime Whitepaper
PPTX
Owasp web application security trends
PPTX
[2.1] Web application Security Trends - Omar Ganiev
PDF
CMS Website Security Threat Protection Oriented Analyzer System
PDF
Java Application Development Vulnerabilities
PDF
Security, more important than ever!
PPTX
Tips for web security
PPTX
Tips for web security
PPTX
Web application framework
PDF
Isset Presentation @ EECI2009
PPT
Website Security
PPT
Website Security
PPTX
Cyber ppt
PPTX
Securing the e marketing site
PPT
Web Speed And Scalability
PDF
Advanced security - Seccom Global
PDF
How to Secure Web Apps — A Web App Security Checklist
PDF
10 server security hacks to secure your web servers
OWASP Portland - OWASP Top 10 For JavaScript Developers
A security note for web developers
Injecting Security into Web apps at Runtime Whitepaper
Owasp web application security trends
[2.1] Web application Security Trends - Omar Ganiev
CMS Website Security Threat Protection Oriented Analyzer System
Java Application Development Vulnerabilities
Security, more important than ever!
Tips for web security
Tips for web security
Web application framework
Isset Presentation @ EECI2009
Website Security
Website Security
Cyber ppt
Securing the e marketing site
Web Speed And Scalability
Advanced security - Seccom Global
How to Secure Web Apps — A Web App Security Checklist
10 server security hacks to secure your web servers

More from Nelsan Ellis (10)

PPTX
Social media marketing trends for 2014
PPTX
The modern marketer
PPTX
Marketing campaign ideas
PPTX
Social media trends 2013
PPTX
Application Development Tools For Android
PPTX
Social Media Strategy For 2013
PPTX
Android App Marketing
PPTX
Iphone vs android
PPTX
Social Media Marketing
PPTX
Facebook vs google+
Social media marketing trends for 2014
The modern marketer
Marketing campaign ideas
Social media trends 2013
Application Development Tools For Android
Social Media Strategy For 2013
Android App Marketing
Iphone vs android
Social Media Marketing
Facebook vs google+

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Web Application Security

  • 1. Created By Cygnis Media http://www.cygnismedia.com/
  • 2.  Web application security is a branch of Information Security that deals specifically with security of websites, web applications and web services.  At a high level, Web application security draws on the principles of application security but applies them specifically to Internet and Web systems. Typically web applications are developed using programming languages such as PHP, Java EE, Java, Python, Ruby, ASP.NET, C#, VB.NET or Classic ASP.
  • 3.  Content-Security-Policy  X-Frame-Options  Anti-CSRF cryptographic nonces on all secure functions  DAL (data/database access layer)  Unwritable file system  Forensically secure logging  Secure credential/passwd/secret questions and answers storage  Security frameworks  autocomplete="off" and strong passwords
  • 4.  We suggest you apply this with the notifying switched on, so that you can see what's splitting as your devs will work on it. It can be incredibly hard to develop into your website retroactively, because it usually includes either including so many whitelists that it's essentially useless, or having to go carefully through your website to make a large stock, expecting that you don't skip anything along the way. There is now a bookmarklet to help as well.
  • 5.  (one time tokens tied to user sessions) into each type and verifying that to make sure that your site can't be compelled to execute activities. This can be a huge pain to retrofit because it means in contact with a data source or distributed storage on every hit — in addition to the rule that needs to be placed into each web page with a type and following operate to confirm the nonce.
  • 6.  We suggest building nonces (one time tokens tied to user sessions) into each type and verifying that to make sure that your site can't be compelled to execute activities. This can be a large pain to retrofit because it means in contact with a data source or distributed storage on every hit in addition to the rule that needs to be placed into each web page with a type and following operate to confirm the nonce.
  • 7.  DALs help to avoid SQLinjection. Few organizations know about them or use them properly, but by front side finishing all data source with an abstraction part many types of SQL hypodermic injection basically don't succeed because they are not properly established. DALs can be costly and incredibly complicated to retrofit because every individual data source contact needs adjustment and interpolation at the DAL part.
  • 8.  Making the website rule and webserver configs on the computer file program unwritable by the web customer is a large protection benefits post- compromise. Almost no sites take this precautionary activity but it makes many types of exploitation nearly difficult. Retrofitting this is difficult to do later because plenty of things usually depend on local computer file program creates as the site advances over time, even though this type of style can be incredibly poor.
  • 9.  Records that are sent off-host or are created otherwise not reachable by the web customer help avoid overwriting the computer file program, regional consist of strikes, eliminating the assailant's paths from the logs and so on. It's challenging to describe how useful it is to have untampered logs until after it's too delayed. It is challenging to retrofit because it usually needs creating different signing facilities and developing some way to duplicate or instantly transportation the logs.
  • 10.  How many sites have we seen affected and all of the information is taken? In most situations it is either plaintext or badly hashed with an outdated hashing criteria, like MD5. Supposing that everything in the information source is duplicated off, the enemy still shouldn't have accessibility anything without investing loads of sources to break individual series. This can be extremely complicated to retrofit because many site features depend on current information source styles and the associated organized information.
  • 11.  Collections for managing and sanitising or rejecting customer feedback (XSS, SQLi, Control hypodermic injection, etc...) significantly enhance your capability to proactively secure yourself when used consistently across the website. Collections like this usually need modifying many website features, and these frameworks therefore contact almost every feedback, so it can be a headache to develop after the fact.
  • 12.  To secure your website from incredible power and from the latest allergy of protection problems in autocomplete, it is a wise decision to apply both of these. If your customers think the web browser will keep in mind their protection passwords for them it's going to be a headache when you convert autocomplete="off" later. If you convert it off beginning, they'll select poor protection passwords. So you really need both at the same time. You don't want the assistance expenses of all of your customers contacting you trying to determine how to get returning into their consideration.
  • 13. Created By Cygnis Media: http://www.cygnismedia.com/Data Collect: itproportal.com