01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1. Am I being attacked right now?<br />

2. Where are the attacks being successful?<br />

Answering these two questions require visual representations in order to detect outliers and statistically<br />

relevant data.<br />

3. Business Logic<br />

There are inherently parts of an application that are more important to your business than others.<br />

Do you care if someone attempts XSS on your site? Maybe.<br />

Do you care if the number of failed logins has spiked in the last hour? Probably.<br />

Do you care if those are two events are correlated? Definitely.<br />

Do you care if you are seeing SQL injections and HTTP 500’s spike at the same time? You bet!<br />

When dealing with business logic and attacks specific to the application being defended, its critical to be<br />

able to correlate disparate data sets. This includes:<br />

• XSS, SQLi, CMDEXE, and other application security attacks<br />

• HTTP errors, Tor exit node traffic, and other anomaly flows<br />

• Account Creations, Successful Logins, and other business flows<br />

4. <strong>Defense</strong> against Bots and Scrapers<br />

Some products specialize in keeping out bots and scrapers. Other products like honeypots specialize in<br />

enticing them. Not all bots are http-based, however most application security defense has some method to<br />

deal with bots coming in over http whether that be through:<br />

• CAPTCHAs<br />

• Analyzing traffic sources<br />

• Fingerprinting traffic and headers<br />

• Anomalous traffic patterns<br />

Since not all bots are http, a pure application security defense approach won’t cut it. However, most AppSec<br />

programs implement a safety valve at the http layer.<br />

While application security is no longer in its infancy, the playing field is constantly changing and attackers<br />

are pushing the boundaries of their methods. Pin this list to the fridge as your development team<br />

experiments with new architectures -- it will save you some serious headaches down the road.<br />

77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!