CSF011G04 - OS Application & Database Security
CSF011G04 - OS Application & Database Security
Welcome to:
• Need of protection
– It must be ensured that the operating systems running on the client
workstations and on the network servers are secure enough and can
prevent security attacks
• Hardening the Operating System
– Operating System hardening refers to the process of making the
operating system secure from possible attacks & intrusions in order to
safeguard information
• There are four universal categories of hardening to follow:
– Disabling services which are unnecessary
– Management interface and applications protection
– Protection of authentication
– Disabling accounts which are unnecessary
• Hardware firewall
– Packet filtering method is used by the hardware firewall for data
transferring. It determines the source addresses and destination by
comparing the packet headers. The packets are dropped or transferred
on the basis of the rules it compares.
• Antivirus
– Antivirus software is an application that is installed on a system to
protect it and to scan for viruses as well as worms and trojans
• Software Firewall
– Software firewalls are applications based on programs that run on a
computer system. The firewalls work by checking all the information
which is received on them and also by monitoring all ports which are
open on a computer
• Fuzzing
– It is possible to enter unexpected values and cause the application to
crash
• Cross-Site Request Forgery
– Cross-Site Request Forgery, also known as XSRF, session riding, and
one-click attack, involves unauthorized commands coming from a
trusted user to the website
• Application Configuration Baselining
– In Baselining, a metric is considered to compare performance.
Baselining can be done with any metric, such as network performance
or CPU usage, as well as with applications
• Programming
– The steps of programming are also sometimes known as phase of
coding. This steps involve the software design implementation
• Testing
– In this step the software is tested while coding phase is on by the
developers. Testing is done thoroughly by experts of testing at different
code levels such as program testing, product testing, module testing,
testing the product at user’s end and in-house testing
• Maintenance
– According to the changes taking place in the technology or user-end,
the maintenance of software is carried out
• Database
– The usage of computing systems has increased rapidly in the modern
times due to its ability to access, modify and store data. This data
when stored in the computer in a systematic way is known as a
database
• Data Repositories
– A physical and logical grouping of data from related but different
databases is known as a data repository. The data is allowed to be
accessed and stored based on certain attributes or characters by this
approach. Appropriate data must be published to the users by the
directory services
• Directory Services
– The directory service is a method which allows storage, deletion and
access of data from database repositories
• Web Security
– Web security is a branch of information security that deals specifically
with security of websites, web application and web services. It
addresses the issues that are specific to how web servers present their
content to web browsers, how the browsers interact with the servers,
and how people interact with the browsers
• Web Application Security
– Web application security falls under the umbrella of web security. It is
the process of securing confidential data stored online from
modification and unauthorized access. Policy measures must be
enforced to accomplish this
• Web browser
– The person assessing the site should also browse it using a web
browser which is regular as a user mainly interacts with a web
application through a browser
• Web application security scanner
– The process of locating the vulnerabilities in web application in a faster
manner is accomplished by using web application security scanner.
The vast areas can be covered by an automatic scanner in minutes. It
can traverse sites at a pace much faster than a human
• HTTP editor
– Sometimes manipulations are done on raw HTTP requests when
carrying out an assessment of the security of the web application. A
HTTP request editor must be used as a browser and must not allow
manipulations of such kind
• Explanation
– The security challenges provided by mobile devices such as iPads,
netbooks, Smartphones, etc. are much above then the servers,
workstations, etc. This is because the mobile devices leave the
organizations and as a result the odds that they would be stolen and
misused
• Types of mobile application
– Web applications
– Native applications
– Hybrid applications
• Threat vectors
– Social engineering attacks can bypass antivirus defenses arising threat
vectors for infecting the mobile devices. The users of the mobile
devices are deceived into installing apps that are malicious in nature.
The mobile devices also have more input sources than the desktop
systems which also enhance the threat vectors associated
• Security risks
– Mobile applications have the ability to access security-critical servers,
storage and networking systems. An attacker who can exploit an
application can access or disrupt these systems as well