SlideShare a Scribd company logo
Why Use Threat Model For
Applications
 Deliver the scalability needed in large enterprise
environments
 Reduce the involvement of subject matter experts
 Make the application threat modeling process less
time consuming and tedious to implement
 Provide a meaningful output, or allow for real-time
collaboration between stakeholders
CYBER
SECURITY
Made For
Security
Chiranjibi Adhikari
President at npCert (Information Security
Response Team Nepal)
Immediate Past President at Center For
Cyber Security Research and Innovation
(CSRI)
Executive Director at OneCover Pvt. Ltd.
Founder of ICT Frame Magazine
Secretary at CAN Federation
Member at OWASP
Member at ISACA
Recommended Security Test For National
Library Portal
observe Thoroughly
 Injection Flaws
 Cross site Scripting
 Insecure Direct Object references
 Open URL redirects
 Cross Site Request Forgery
 Command Injection
 Broken Authentication,
 Security Misconfiguration, Sensitive Data Exposure
 API Testing
Application Security
 Deliver the scalability needed in large enterprise
environments
 Reduce the involvement of subject matter experts
 Make the application threat modeling process less
time consuming and tedious to implement
 Provide a meaningful output, or allow for real-time
collaboration between stakeholders
Application Threat Modeling
Open Source Tool
Microsoft Threat Modeling
Cybersecurity best practices for
businesses that every employee
should know and follow
 DO NOT OPEN ANY LINKS OR DOWNLOAD ANY
ATTACHMENTS
 DO NOT CLICK ON POP-UPS
 DO NOT DISABLE FIREWALL
 ENABLE MULTI FACTOR AUTHENTICATION (MFA)
Cybersecurity best practices for
businesses that every employee should
know and follow
 UPDATE to the latest security patches for your
desktop
 Use Enterprise Virtual Private Network
 LOCK your devices before you leave your devices
unsupervised
 Enforce Communication with the USE of End-to-end
(E2E)
 INCREASE PASSWORD COMPLEXITY
 Beware about SHOULDER SURFING as others might
be able to see/listen to some sensitive and confidential
information.
Best security practices that every
business should follow
 Review your Business Continuity Planning (BCP)
and Procedures.
 Update your Organization’s Infrastructures
 Use of Multi-Factor Authentication
 Strictly Monitor user access and user roles:
 Define access right for your Infrastructure
Best security practices that every
business should follow
 Reduce timeout for employees accessing
organization resources remotely
 Backup and store data securely
 Ensure physical security measures are taken by
employees
Incident Response Plan during Work
From Home
 Make a list of critical infrastructures that need
addressing.
 Prioritize the infrastructures accordingly.
 Maintain a detail overview of organizations
network architecture.
 Assign the incident lead task to a relevant person
who will communicate with the team.
 Train all staff to distinguish fake emails from the
real ones and immediately report the suspicious
emails or attachments.
Work From Home Cybersecurity
Basics: Incident Response Planning
 Make a complete backup of the system so that they
can be restored in a timely manner in case of
incident.
Checklists:
1. Who is responsible to react to the incident at first and
take a lead on it?
2. Who is responsible for each process of the Incidence
Response?
3. If the team needs third party expertise. How will be
communication handled?
4. How is legal part of the incident handled?
Do's and Don'ts of Effective Incident
Response Procedure
1) First of all, don’t panic.
2) Don’t shut down any infected systems as it might delete the juicy
data which is very important when performing forensics
investigation.
3) Don’t use any non-forensic tools as they can overwrite the timeline
associated with the attack.
4) Collect logs from different areas.
For windows collect application/security/system logs from event
viewer
For Linux collect /var/log/*
5) Don’t wipe any non-important files/data.
Defense in Depth Planning
Physical control:
Technical control
Administrative control
Technical control
 Firewall
 Intrusion prevention system for Network and host devices.
 Advanced anti-malware
 Anti-spam and anti-phishing at the Web and messaging
gateways
 Web reputation
 Application control
 Content filtering
 Vulnerability shielding
 Mobile app reputation
 Effective cyber security awareness training for all employees
Steps To Take After a Data Breach
Steps To Take After a Data Breach
1) Notify immediately:
2) Notify what information has been breached
3) Request for Modification
Steps To Take After a Data Breach
4) Investigating the incident
5) Find & Mitigating Vulnerabilities
6) Protection against Future Incidents
<Thank You>

More Related Content

PPTX
Protecting Windows Networks From Malware
PDF
Cisco amp everywhere
PPTX
What is penetration testing and why is it important for a business to invest ...
PPTX
New Developments in Cybersecurity and Technology for RDOs: Howland
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
PPTX
Alienvault threat alerts in spiceworks
Protecting Windows Networks From Malware
Cisco amp everywhere
What is penetration testing and why is it important for a business to invest ...
New Developments in Cybersecurity and Technology for RDOs: Howland
How to Detect System Compromise & Data Exfiltration with AlienVault USM
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
Alienvault threat alerts in spiceworks

What's hot (20)

PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PDF
OSB130 Patch Management Best Practices
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
Cisco amp for endpoints
PDF
Web App Attacks - Stats & Remediation
PPT
Security testing vikesh kumar
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Network Security for Employees
PPT
Software Security Engineering
PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
PPTX
Six Steps to SIEM Success
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PDF
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Automating Critical Security Controls for Threat Remediation and Compliance
OSB130 Patch Management Best Practices
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Cisco amp for endpoints
Web App Attacks - Stats & Remediation
Security testing vikesh kumar
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Malware detection how to spot infections early with alien vault usm
Network Security for Employees
Software Security Engineering
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Six Steps to SIEM Success
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
7 Steps to Build a SOC with Limited Resources
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Ad

Similar to Web application security measures (20)

PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Cybersecurity Basics of awareness presentation .pptx
PDF
BEST CYBER SECURITY PRACTICES
PPTX
Understanding Cyber Security and benifit
PPT
Guard Era Security Overview Preso (Draft)
PPTX
afafafafa of afafafafafafaf kingdom.pptx
PPTX
cyber security awareness------------.pptx
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PPTX
IT_Security_Awareness_Detailed_PPT1.pptx
PPTX
Cyber Security.pptx report or a seminar internship
PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PDF
CYBERSECURITY FOR REMOTE WORK: BEST PRACTICES FOR PROTECTING YOUR BUSINESS
PPTX
Cyber Threats Awareness, Prevention, and Defense - DigitDefence
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PPTX
Tsc2021 cyber-issues
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PPTX
Cybersecurity Fundamentals for Legal Professionals
PPTX
Cybersecurity for Small Business - Incident Response.pptx
PPTX
Top Cybersecurity Challenges Facing Your Business
CyberCare Pro - Cybersecurity for SME's updated.pptx
Cybersecurity Basics of awareness presentation .pptx
BEST CYBER SECURITY PRACTICES
Understanding Cyber Security and benifit
Guard Era Security Overview Preso (Draft)
afafafafa of afafafafafafaf kingdom.pptx
cyber security awareness------------.pptx
2022 Rea & Associates' Cybersecurity Conference
 
IT_Security_Awareness_Detailed_PPT1.pptx
Cyber Security.pptx report or a seminar internship
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
CYBERSECURITY FOR REMOTE WORK: BEST PRACTICES FOR PROTECTING YOUR BUSINESS
Cyber Threats Awareness, Prevention, and Defense - DigitDefence
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
Tsc2021 cyber-issues
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity for Small Business - Incident Response.pptx
Top Cybersecurity Challenges Facing Your Business
Ad

More from ICT Frame Magazine Pvt. Ltd. (20)

PPTX
U.S.-Nepal ICT Opportunities: Navigating Nepal's Digital Decade
PDF
Enhancing Parental Roles in Protecting Children from Online Sexual Exploitati...
PDF
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
PPTX
Multistakeholder Consultation on DNF 2.0 and way forward: Adesh Khadka
PPTX
DNF 2.0 Implementations Challenges in Nepal
PDF
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
PDF
Digital HealthandSILinNepal Presented By Er. Ramesh Raj Subedi IT Director
PDF
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
PDF
Nepal Unveils E-Governance Blueprint for Paperless Public Services
PDF
Social Media Regulation Proposed in Nepal.pdf
PDF
ChildSafeNet Annual Report 2024 Nepal.pdf
PDF
safe-software-deployment-how-software-manufacturers-can-ensure-reliability-fo...
PDF
Nepal Development Update October 2024.pdf
PDF
Nepal Rastra Bank Releases Green Finance .pdf
PDF
Social Media Bill Analysis Paper Final Nepal
PDF
Nepal 3 Months Jail for Sidhakura Publisher & Editor in Contempt Case
PDF
Nepal Infrastructure Summit 2024 Building a Sustainable and Connected Future.pdf
PDF
Digital Nepal Framework Gap Analysis.pdf
PDF
CNI Budget Watch 2024 in Kathmandu Nepal.pdf
PDF
Personal-Data-Protection-Policy-of-Nepal.pdf
U.S.-Nepal ICT Opportunities: Navigating Nepal's Digital Decade
Enhancing Parental Roles in Protecting Children from Online Sexual Exploitati...
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Multistakeholder Consultation on DNF 2.0 and way forward: Adesh Khadka
DNF 2.0 Implementations Challenges in Nepal
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
Digital HealthandSILinNepal Presented By Er. Ramesh Raj Subedi IT Director
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
Nepal Unveils E-Governance Blueprint for Paperless Public Services
Social Media Regulation Proposed in Nepal.pdf
ChildSafeNet Annual Report 2024 Nepal.pdf
safe-software-deployment-how-software-manufacturers-can-ensure-reliability-fo...
Nepal Development Update October 2024.pdf
Nepal Rastra Bank Releases Green Finance .pdf
Social Media Bill Analysis Paper Final Nepal
Nepal 3 Months Jail for Sidhakura Publisher & Editor in Contempt Case
Nepal Infrastructure Summit 2024 Building a Sustainable and Connected Future.pdf
Digital Nepal Framework Gap Analysis.pdf
CNI Budget Watch 2024 in Kathmandu Nepal.pdf
Personal-Data-Protection-Policy-of-Nepal.pdf

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology

Web application security measures

  • 1. Why Use Threat Model For Applications  Deliver the scalability needed in large enterprise environments  Reduce the involvement of subject matter experts  Make the application threat modeling process less time consuming and tedious to implement  Provide a meaningful output, or allow for real-time collaboration between stakeholders
  • 3. Made For Security Chiranjibi Adhikari President at npCert (Information Security Response Team Nepal) Immediate Past President at Center For Cyber Security Research and Innovation (CSRI) Executive Director at OneCover Pvt. Ltd. Founder of ICT Frame Magazine Secretary at CAN Federation Member at OWASP Member at ISACA
  • 4. Recommended Security Test For National Library Portal observe Thoroughly  Injection Flaws  Cross site Scripting  Insecure Direct Object references  Open URL redirects  Cross Site Request Forgery  Command Injection  Broken Authentication,  Security Misconfiguration, Sensitive Data Exposure  API Testing
  • 6.  Deliver the scalability needed in large enterprise environments  Reduce the involvement of subject matter experts  Make the application threat modeling process less time consuming and tedious to implement  Provide a meaningful output, or allow for real-time collaboration between stakeholders Application Threat Modeling
  • 9. Cybersecurity best practices for businesses that every employee should know and follow  DO NOT OPEN ANY LINKS OR DOWNLOAD ANY ATTACHMENTS  DO NOT CLICK ON POP-UPS  DO NOT DISABLE FIREWALL  ENABLE MULTI FACTOR AUTHENTICATION (MFA)
  • 10. Cybersecurity best practices for businesses that every employee should know and follow  UPDATE to the latest security patches for your desktop  Use Enterprise Virtual Private Network  LOCK your devices before you leave your devices unsupervised  Enforce Communication with the USE of End-to-end (E2E)  INCREASE PASSWORD COMPLEXITY  Beware about SHOULDER SURFING as others might be able to see/listen to some sensitive and confidential information.
  • 11. Best security practices that every business should follow  Review your Business Continuity Planning (BCP) and Procedures.  Update your Organization’s Infrastructures  Use of Multi-Factor Authentication  Strictly Monitor user access and user roles:  Define access right for your Infrastructure
  • 12. Best security practices that every business should follow  Reduce timeout for employees accessing organization resources remotely  Backup and store data securely  Ensure physical security measures are taken by employees
  • 13. Incident Response Plan during Work From Home  Make a list of critical infrastructures that need addressing.  Prioritize the infrastructures accordingly.  Maintain a detail overview of organizations network architecture.  Assign the incident lead task to a relevant person who will communicate with the team.  Train all staff to distinguish fake emails from the real ones and immediately report the suspicious emails or attachments.
  • 14. Work From Home Cybersecurity Basics: Incident Response Planning  Make a complete backup of the system so that they can be restored in a timely manner in case of incident. Checklists: 1. Who is responsible to react to the incident at first and take a lead on it? 2. Who is responsible for each process of the Incidence Response? 3. If the team needs third party expertise. How will be communication handled? 4. How is legal part of the incident handled?
  • 15. Do's and Don'ts of Effective Incident Response Procedure 1) First of all, don’t panic. 2) Don’t shut down any infected systems as it might delete the juicy data which is very important when performing forensics investigation. 3) Don’t use any non-forensic tools as they can overwrite the timeline associated with the attack. 4) Collect logs from different areas. For windows collect application/security/system logs from event viewer For Linux collect /var/log/* 5) Don’t wipe any non-important files/data.
  • 16. Defense in Depth Planning Physical control: Technical control Administrative control
  • 17. Technical control  Firewall  Intrusion prevention system for Network and host devices.  Advanced anti-malware  Anti-spam and anti-phishing at the Web and messaging gateways  Web reputation  Application control  Content filtering  Vulnerability shielding  Mobile app reputation  Effective cyber security awareness training for all employees
  • 18. Steps To Take After a Data Breach
  • 19. Steps To Take After a Data Breach 1) Notify immediately: 2) Notify what information has been breached 3) Request for Modification
  • 20. Steps To Take After a Data Breach 4) Investigating the incident 5) Find & Mitigating Vulnerabilities 6) Protection against Future Incidents <Thank You>

Editor's Notes