Web App Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Web App

Security
TABLE OF CONTENTS

What is Web OWASP


01 app security? 02 Foundacion

-
Top 10 Web Cryptographic
03 Application 04 Failures
Security risk - SQL injection
What is
01 Web App
Security?
Web Application Security

Refers to the practice of protecting web applications from threats and


attacks that could compromise their integrity, confidentiality and
availability. It means implementing security measures and adopting best
practices to prevent common vulnerabilities

● Integrity: refers to ensuring that data maintains its accuracy and completeness.
● Confidentiality: is about limiting access to information to authorized users only.
● Availability: ensures that services and resources are accessible when needed,
without unauthorized interruptions.
OWASP
Foundacion 02
OWASP
Foundacion
Works to improve software security through its
community-driven open source software
projects, hundreds of chapters worldwide, tens
of thousands of members, and by hosting local
and global conferences.
03
Top 10
Web App
Security
Risk
Top 10 Web App Security Risk

Broken Access Vulnerable and


1 Control 6 Outdated Components

Cryptographi Identification and


2 c Failures 7 Authentication Failures

Software and Data


3 Injection 8 Integrity Failures
Security Logging
Insecure
4 Design 9 and Monitoring
Failures
Security 1 Server-Side
5 Misconfiguratio
n 0 Request Forgery
Cryptographic
04.1 Failures

04. SQL
2 Injection
Cryptographic Failures

Poor cryptography directly affects the


security of an application and its data. Lack
of security can let attackers steal and modify
data to conduct fraud, and identity theft,
which can lead to serious consequences.
Attackers try to steal keys, execute
man-in-the-middle attacks, or steal data
from the server, in transit, or from the
browser. This again leads to compromise in
sensitive information.
What is the attack MITM
Man-in-the-middle

● An attack man in the middle (MITM) is a general term for when a


perpetrator positions himself in a conversation between a user and
an application, either to eavesdrop on or impersonate one of the
parties, making it appear as if a normal exchange of information is
taking place.
● Broadly speaking, a MITM attack is the equivalent of a postman
opening your bank statement, writing down your account details, and
then resealing the envelope and delivering it to your home.
SQL Injection
● SQL injection (SQLi) is a web security vulnerability
that allows an attacker to interfere with the queries
that an application makes to its database. This can
allow an attacker to view data that they are not
normally able to retrieve. This might include data
that belongs to other users, or any other data that
the application can access. In many cases, an
attacker can modify or delete this data, causing
persistent changes to the application's content or
behavior.
● In some situations, an attacker can escalate a SQL
injection attack to compromise the underlying
server or other back-end infrastructure. It can also
enable them to perform denial-of-service attacks.
What is the impact of a successful
SQL Injection attack?
A successful SQL injection attack can result in unauthorized access to
sensitive data, such as:

● Passwords.
● Credit card details.
● Personal user information.

SQL injection attacks have been used in many high-profile data breaches
over the years. These have caused reputational damage and regulatory fines.
In some cases, an attacker can obtain a persistent backdoor into an
organization's systems, leading to a long-term compromise that can go
unnoticed for an extended period.

You might also like