11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

18 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresTable 2.1 STRIDE <strong>Threats</strong> <strong>and</strong> Countermeasures (continued)ThreatCountermeasuresRepudiationCreate secure audit trails.Use digital signatures.Information disclosureDenial of serviceElevation of privilegeUse strong authorization.Use strong encryption.Secure communication links with protocols that provide messageconfidentiality.Do not store secrets (for example, passwords) in plaintext.Use resource <strong>and</strong> b<strong>and</strong>width throttling techniques.Validate <strong>and</strong> filter input.Follow the principle of least privilege <strong>and</strong> use least privileged serviceaccounts to run processes <strong>and</strong> access resources.Network <strong>Threats</strong> <strong>and</strong> CountermeasuresThe primary components that make up your network infrastructure are routers,firewalls, <strong>and</strong> switches. They act as the gatekeepers guarding your servers <strong>and</strong>applications from attacks <strong>and</strong> intrusions. An attacker may exploit poorly configurednetwork devices. Common vulnerabilities include weak default installation settings,wide open access controls, <strong>and</strong> devices lacking the latest security patches. Topnetwork level threats include:● Information gathering● Sniffing● Spoofing● Session hijacking● Denial of serviceInformation GatheringNetwork devices can be discovered <strong>and</strong> profiled in much the same way as othertypes of systems. Attackers usually start with port scanning. After they identify openports, they use banner grabbing <strong>and</strong> enumeration to detect device types <strong>and</strong> todetermine operating system <strong>and</strong> application versions. Armed with this information,an attacker can attack known vulnerabilities that may not be updated with securitypatches.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!