SlideShare a Scribd company logo
B.Rakesh
Dr.Paul Raj Engineering college
WEB SECURITY
CONTENTS
What is Web Security ?
Why Web Security ?
Types of Web Attacks
How to Provide security
Conclusion
What is web security ?
Web security is a branch of
Network security that deals
specifically with security of
websites, web applications
and web services.
.
Why Web Security ?
To provide privacy and confidentiality to the
web application ,website and web servers
Types of Web Attacks
sql injecting
Passcode cracking
Session Hijacking
Xss
phishing
SQL INJECTION
SQL injection (SQLi) refers to an injection
attack where in an attacker can execute ma
licious SQL statements that control a web
application's database server
EXAMPLE WITH PROGRAM
Web security
Cross site scripting attack
Cross-Site Scripting (XSS) attacks are a type
of injection, in which malicious scripts are
injected into otherwise benign and trusted
web sites.
XSS attacks occur when an attacker uses a we
b application to send malicious code,
generally in the form of a browser
side script, to a different end user.
Cross site scripting attack
Cross site scripting attack
Passcode cracking
A password cracker is an application program tha
t is used to identify an unknown or forgotten pas
sword to a computer or network resources.
It can also be used to help a human cracker obt
ain unauthorized access to resources.
Passcode cracking Example
Passcode cracking
• Brutus is one of the most popular remote
online password cracking tools. ...
•RainbowCrack. ...
•Wfuzz. ...
•John the Ripper. ...
•THC Hydra. ...
•Medusa. ...
•OphCrack
•Kali linux
Session Hijacking
The most common method of session
hijacking is called IP spoofing,
when an attacker uses source-routed IP packets
to insert commands into an active communic
ation between two nodes on a network and
disguising itself as one of the authenticated user
s.
Session Hijacking Example
Web security
Phishing
phishing is a term used to describe a malicious
individual or group of individuals who scam users
.
They create duplicate website for Knowing the
user id, passwords and Bank details of
targeted peoples
Phishing Examples
Web security
Phishing Programming
How to Provide security
Security Methods
High security passcodes
Digital Signatures
Encp & Dcpt
Biometric authentication
High security passwords
Some websites provides high security for your
online transactions. The enable High Security
feature helps define high security settings in
your profile.
By enabling this feature, for every transaction
you make, you will receive a high security pa
ssword on your mobile. You need to enter thi
s password to complete the transaction.
High Security passcodes Examples
Web security
Web security
Digital Signatures
What is Digital Signature?
Hash value of a message when
encrypted with the private k
ey of a person is his digital sig
nature on that e-Document
Why Digital signature
To provide Authenticity, Integrity and Non-repudi
ation to electronic documents
To use the Internet as the safe and secure mediu
m for e-Commerce and e-Governance
Digital Signatures
Architecture
Digital signature
•Government Online
•Issuing forms and licences
•Govt orders/treasury orders
•Registration
•Online file movement system
•Public information records
•E-voting
Encryption and Decryption
Encryption
The translation of data into a secret code. Encryptio
n is the most effective way to achieve data security.
To read an encrypted file, you must have access to a
secret key or password that enables you to decrypt
Decryption
Decryption is the process of taking enco
ded or encrypted text or other data and
converting it back into text that you or t
he computer can read and understand
Biometric Authentication
Biometric security is a security mechanism used to
authenticate and provide access to a facility or syst
em based on the automatic and instant verification
of web based applications
Why Biometric Security
Traditional methods involving passwords
and PIN numbers
Biometrics highest level of security
Architecture
Conclusion
In future the more security methods available
for the websites, the betterand safer the future
will be for all of us
Thanking You
Queries…..??

More Related Content

PPT
Secure code practices
PDF
5. Identity and Access Management
PDF
Sql Injection - Vulnerability and Security
PPT
Web security
PPTX
Introduction to Network Security
PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PPTX
Intrusion detection system
PPT
Web security
Secure code practices
5. Identity and Access Management
Sql Injection - Vulnerability and Security
Web security
Introduction to Network Security
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Intrusion detection system
Web security

What's hot (20)

PDF
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
PPSX
Web security
PPTX
Career in cyber security
PPTX
Wi Fi Security
PPT
A Brief Introduction in SQL Injection
PPTX
A Career in Cybersecurity
PPTX
Web Security
PPTX
Security Information and Event Management (SIEM)
PDF
The What, Why, and How of DevSecOps
PDF
Web application security & Testing
PPTX
Information risk management
PPT
PPTX
Web Security
PPTX
Intrusion detection
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Identity and Access Management (IAM)
PPT
Information Security Policies and Standards
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PDF
Security testing presentation
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Web security
Career in cyber security
Wi Fi Security
A Brief Introduction in SQL Injection
A Career in Cybersecurity
Web Security
Security Information and Event Management (SIEM)
The What, Why, and How of DevSecOps
Web application security & Testing
Information risk management
Web Security
Intrusion detection
Computer Security and Intrusion Detection(IDS/IPS)
Identity and Access Management (IAM)
Information Security Policies and Standards
OWASP Top 10 2021 Presentation (Jul 2022)
Security testing presentation
Ad

Viewers also liked (20)

PPTX
Web security
PDF
Web Security - Introduction v.1.3
PDF
Web Security
PPT
Security in Web 2.0, Social Web and Cloud
PPT
Php & Web Security - PHPXperts 2009
KEY
Introduction to web security @ confess 2012
PPT
Top Ten Proactive Web Security Controls v5
PDF
Web Security
PDF
Cisco Study: State of Web Security
PDF
Evolution Of Web Security
PDF
Modern Web Security
PDF
Top 10 Web App Security Risks
PPTX
Introduction to Web security
PPT
Discriminant analysis group no. 4
PPTX
Web Server Web Site Security
PDF
Web Application Security
PDF
DrupalCamp London 2017 - Web site insecurity
PPTX
Extreme security in web servers
PPT
Tutorial 09 - Security on the Internet and the Web
 
Web security
Web Security - Introduction v.1.3
Web Security
Security in Web 2.0, Social Web and Cloud
Php & Web Security - PHPXperts 2009
Introduction to web security @ confess 2012
Top Ten Proactive Web Security Controls v5
Web Security
Cisco Study: State of Web Security
Evolution Of Web Security
Modern Web Security
Top 10 Web App Security Risks
Introduction to Web security
Discriminant analysis group no. 4
Web Server Web Site Security
Web Application Security
DrupalCamp London 2017 - Web site insecurity
Extreme security in web servers
Tutorial 09 - Security on the Internet and the Web
 
Ad

Similar to Web security (20)

PPTX
INTERNETSECURITY with the different threats
PPTX
Security in e commerce
PDF
Introduction to Information Security
PPTX
Chapter 2 System Security.pptx
PPTX
Week 7 Basics of Web Security, a course in cyber security.pptx
PPTX
cryptographydiksha.pptx
PPTX
Ledingkart Meetup #3: Security Basics for Developers
PPTX
An An Exploration Into the Cyber Security
PPTX
Security issues in e business
PPTX
Protect your Privacy
PPTX
PPTX
FCT UNIT 5 Foundation of computing technologies.pptx
PPT
E commerce security
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
PPT
Technical seminar on Security
PPTX
Cryptography and network Security--MOD-1.pptx
PPTX
Chapter 2 Overview of Commercial Issues.pptx
PPT
Cyber security for an organization
PPTX
Cyber security
INTERNETSECURITY with the different threats
Security in e commerce
Introduction to Information Security
Chapter 2 System Security.pptx
Week 7 Basics of Web Security, a course in cyber security.pptx
cryptographydiksha.pptx
Ledingkart Meetup #3: Security Basics for Developers
An An Exploration Into the Cyber Security
Security issues in e business
Protect your Privacy
FCT UNIT 5 Foundation of computing technologies.pptx
E commerce security
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Technical seminar on Security
Cryptography and network Security--MOD-1.pptx
Chapter 2 Overview of Commercial Issues.pptx
Cyber security for an organization
Cyber security

Recently uploaded (20)

PPTX
Virtual and Augmented Reality in Current Scenario
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
advance database management system book.pdf
PDF
IGGE1 Understanding the Self1234567891011
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Virtual and Augmented Reality in Current Scenario
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
advance database management system book.pdf
IGGE1 Understanding the Self1234567891011
TNA_Presentation-1-Final(SAVE)) (1).pptx
Indian roads congress 037 - 2012 Flexible pavement
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Unit 4 Computer Architecture Multicore Processor.pptx
History, Philosophy and sociology of education (1).pptx
Weekly quiz Compilation Jan -July 25.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Paper A Mock Exam 9_ Attempt review.pdf.
Chinmaya Tiranga quiz Grand Finale.pdf

Web security

  • 3. CONTENTS What is Web Security ? Why Web Security ? Types of Web Attacks How to Provide security Conclusion
  • 4. What is web security ? Web security is a branch of Network security that deals specifically with security of websites, web applications and web services. .
  • 5. Why Web Security ? To provide privacy and confidentiality to the web application ,website and web servers
  • 6. Types of Web Attacks sql injecting Passcode cracking Session Hijacking Xss phishing
  • 7. SQL INJECTION SQL injection (SQLi) refers to an injection attack where in an attacker can execute ma licious SQL statements that control a web application's database server
  • 10. Cross site scripting attack Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a we b application to send malicious code, generally in the form of a browser side script, to a different end user.
  • 13. Passcode cracking A password cracker is an application program tha t is used to identify an unknown or forgotten pas sword to a computer or network resources. It can also be used to help a human cracker obt ain unauthorized access to resources.
  • 15. Passcode cracking • Brutus is one of the most popular remote online password cracking tools. ... •RainbowCrack. ... •Wfuzz. ... •John the Ripper. ... •THC Hydra. ... •Medusa. ... •OphCrack •Kali linux
  • 16. Session Hijacking The most common method of session hijacking is called IP spoofing, when an attacker uses source-routed IP packets to insert commands into an active communic ation between two nodes on a network and disguising itself as one of the authenticated user s.
  • 19. Phishing phishing is a term used to describe a malicious individual or group of individuals who scam users . They create duplicate website for Knowing the user id, passwords and Bank details of targeted peoples
  • 23. How to Provide security
  • 24. Security Methods High security passcodes Digital Signatures Encp & Dcpt Biometric authentication
  • 25. High security passwords Some websites provides high security for your online transactions. The enable High Security feature helps define high security settings in your profile. By enabling this feature, for every transaction you make, you will receive a high security pa ssword on your mobile. You need to enter thi s password to complete the transaction.
  • 29. Digital Signatures What is Digital Signature? Hash value of a message when encrypted with the private k ey of a person is his digital sig nature on that e-Document
  • 30. Why Digital signature To provide Authenticity, Integrity and Non-repudi ation to electronic documents To use the Internet as the safe and secure mediu m for e-Commerce and e-Governance Digital Signatures
  • 32. Digital signature •Government Online •Issuing forms and licences •Govt orders/treasury orders •Registration •Online file movement system •Public information records •E-voting
  • 33. Encryption and Decryption Encryption The translation of data into a secret code. Encryptio n is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt
  • 34. Decryption Decryption is the process of taking enco ded or encrypted text or other data and converting it back into text that you or t he computer can read and understand
  • 35. Biometric Authentication Biometric security is a security mechanism used to authenticate and provide access to a facility or syst em based on the automatic and instant verification of web based applications
  • 36. Why Biometric Security Traditional methods involving passwords and PIN numbers Biometrics highest level of security
  • 38. Conclusion In future the more security methods available for the websites, the betterand safer the future will be for all of us