15
SecuritySpoc Labs

Top five web application security threats

Embed Size (px)

Citation preview

Page 1: Top five web application security threats

SecuritySpoc Labs

Page 2: Top five web application security threats

Security Spoc is founded by group of security enthusiasts those who believes in providing efficient security solutions with in affordable cost.

Team includes certified penetration testers and researchers working towards one goal.

Goal – To give our customers the very best threat detection and response.

Page 3: Top five web application security threats

According to Intel ,there are 305 threats every minute, more than 5 every second.

We are going to discuss five most common threats that web applications face day to day.

How you can mitigate those threats ?

At the end how we can help you achieve complete security from cyber threats.

Page 4: Top five web application security threats

Weak authentication mechanism

No encryption of data

Vulnerable plugins and packages

Malware Infections

Web Application Vulnerabilities

Page 5: Top five web application security threats

Weak authentication enables attackers to intercept login credentials, steal the credentials and trick users to provide credentials which leads to account takeover. Below are some examples of weak authentication Developer still use no or weak encryption algorithms. Password transmitted over non secure channels makes it prone to MITM

attacks. Password complexity is not implemented in application. Same password is used to signup at different applications. Database replication for application having multiple portals, if one portal

gets compromised same hash can be used at others. Cookies transmitted without HTTP-Only and Secure flag. Protection against XSS, SQLi not implemented. No limit on login attempts and login sessions. Cross domain authentication.

Page 6: Top five web application security threats

Credentials should be transmitted over secure and encrypted channels. Credentials should be one way hashed and salted using acceptable hashing

algorithms. Implement session thresholds, password complexity and maximum login

attempts. Should alert user if maximum login attempt limit exhausted. Do not expose credentials in untrusted locations such as cookies, headers or

hidden files. Cross domain login should not be allowed, if needed whitelist the domains. Secure code practices should be implemented against web application

vulnerabilities. Avoid privilege level access based on parameters or cookies values as these can

be modified. Implement Two-Factor authentication if possible. If not required, don’t implement concurrent sessions. Terminate all sessions on password change and alert user for password change. Block user for desired time slot if any web application attack detected. Sign up for our Penetration testing or Web application audit services which helps

you to avoid risk of getting compromised. Contact us at [email protected]

Page 7: Top five web application security threats

Data security and data protection are top priorities for companies these days. Loosing data can be bigger threat to a company reputation and business. As the complexity of networks increase, so does the complexity of keeping them safe from hack. Industry experts believe developers of IoT have not spent time thinking about how to secure their data and services from cyber attacks.

Storing sensitive data like credit card details and private information of clients in clear text at insecure locations can cost higher in case any breach than to implement secure data policy.

SecuritySpoc audit plans helps you audit the secure policies you have implemented in your organization to achieve data protection and data security.

Page 8: Top five web application security threats

Use encryption to store sensitive data like credit card information, credentials.

Define access level on databases and data storage utilities.

Implement proper authorization for accessing the data over network.

Proper data backup policy should be present. Be clear about who in your organization is

responsible for ensuring information security Contact us for auditing and checkup of your

information security policies in place.

Page 9: Top five web application security threats

For delivering and making user friendly services on web applications, various packages and plugins are used by web developers.

These packages and plugins version can be vulnerable to various attacks and can be compromised to get full level access of not even web application, server as well.

Attackers have upper hand in attack if any vulnerable service found running on web application.

There are 305 threats every minute, more than 5 every second. In 2015 count of vulnerabilities detected was 15.4k , 55% increase

over the past five years. Every day vulnerabilities count is increasing which puts web

application at risk of getting compromised. At Security Spoc, we keep an eye on client’s web applications and

alert them in case any vulnerable package found running on their servers.

Page 10: Top five web application security threats

Keep eye on updates of packages and plugins you are running. Make sure to update, If any update available in the market.

Hire us to be your security team. Due to increasing count of vulnerable packages we at

Security Spoc have maintained knowledge base which gets update every 24 hours.

Sign up for our Penetration testing or Web application audit services which helps you to avoid risk of getting compromised.

We will alert you if any vulnerable package or plugin is running on your server.

Contact us at [email protected] to avail discounts.

Page 11: Top five web application security threats

Due to vulnerable packages and plugins, your web application or server can become target of malware infections.

Having malware on web application can impact you website and business reputation.

Search engines black list websites having malware and alert users to not visit website which leads to impact on business.

Infection can spread to internal network if the web server can be accessed on internal network or on same network.

Page 12: Top five web application security threats

Regular antivirus scans of files on server. Update virus definitions of antivirus every day. Stay alert and avoid using vulnerable packages and

plugins. Sign up for Web application and server audit services

which helps you to avoid risk of getting compromised. We will alert you if any vulnerable package or plugin is

running on your server. We help you to achieve security hardening of server

and services to avoid risk of getting compromised. Contact us at [email protected] to avail

discounts.

Page 13: Top five web application security threats

Web application vulnerability is a flaw or weakness in an application that could be exploited to compromise the security of the application.

These vulnerabilities targets the confidentiality, integrity, or availability of resources possessed by an application, its creators, and its users.

OWASP has rated Top 10 web application vulnerabilities which is quite common to be find in web application.

Having web application compromised can have huge impact on reputation of company and business.

In 2015 count of vulnerabilities detected was 15.4k , 55% increase over the past five years.

It is quite common developers to use vulnerability scanner to detect and remedy vulnerabilities, but this method is not entirely secure as scanners quickly become outdated and inaccurate.

Page 14: Top five web application security threats

Follow secure code practices to avoid web application vulnerabilities, you can contact us for our secure web application development to achieve secure code development to avoid vulnerabilities at initial step.

Avoid using vulnerable packages and plugins. Contact us to achieve security hardening of webserver

to reduce impact and fast incident response in case you get compromised.

Contact us for web application penetration testing and security audit of server to achieve best in class security from cyber threats.

Contact us at [email protected] to avail discounts.

Page 15: Top five web application security threats

In case you have any question regarding topics discussed or your information security solution need contact us at below mentioned email.

Reach us at below mentioned email to avail offers on security solutions.

Contact : [email protected] Twitter: @securityspoc , @acekapila Website: http://securitspoc.com