(CyberSec'24) Lab01 - Student Version
(CyberSec'24) Lab01 - Student Version
CIA Triad
Security Terminologies
OWASP TOP 10
Cryptographic Failures
Robots.txt File
Hands-On
Staff E-mails
• TA Abdelrahman Yassin:
[email protected]
• TA Oliver Ayman
[email protected]
• TA Beshoy Victor
[email protected]
What
is Cybersecurity is the protection of internet-connected
systems, including hardware, software, and data
Cyber from cyberattacks.
Security
TYPES
OF
HACKER
S
TYPES OF SECURITY TEAMS
Confidentiality
CIA Integrity
Triad
Availability
Introduction
to Web
Application
Security
Testing
Web Applications vs. Websites
What Are Web Applications?
● Web applications are software programs that run on web servers and are
accessible over the internet through web browsers.
● They are designed to provide interactive and dynamic functionality to users,
allowing them to perform various tasks, access information, and interact with
data online.
● Web applications have become an integral part of modern internet usage, and
they power a wide range of online services and activities.
● Examples of web applications include:
o Social media platforms (e.g., Facebook, Twitter)
o Online email services (e.g., Gmail, Outlook)
o E-commerce websites (e.g., Amazon, eBay)
o Cloud-based productivity tools (e.g., Google Workspace, Microsoft Office 365)
How Do Web Applications Work?
● Client-Server Architecture:
The application's logic and data are hosted on a web server, and users access it using web
browsers on their devices.
● User Interface (UI):
A combination of HTML, CSS and JavaScript to create dynamic and interactive interfaces.
● Internet Connectivity:
Users interact with the application by sending requests to the server, which processes those
requests and sends back the appropriate responses.
● Cross-Platform Compatibility:
Accessible from different devices and operating systems without requiring installation or specific
software, making them platform-independent.
● Statelessness:
HTTP, the protocol used for communication between web browsers and servers, is stateless. Web
applications must manage user sessions and state to remember user interactions and ensure
continuity.
Web Application Security
● Web application security is a critical aspect of cybersecurity that focuses on
protecting web applications from various security threats and vulnerabilities, and
attacks.
● The primary objective of web application security is to ensure the confidentiality,
integrity, and availability of data processed by web applications while mitigating
the risk of unauthorized access, data breaches, and service disruptions.
● Web applications are attractive targets for attackers due to their public
accessibility and the potential for gaining access to sensitive data, such as
personal information, financial data, or intellectual property.
The Importance of Web App
Security
● Web application security is of vital importance in today's digital landscape due to
the increasing reliance on web applications for various purposes.
● Here are some key reasons why web application security is crucial:
o Protection of Sensitive Data.
o Safeguarding User Trust.
o Prevention of Financial Loss.
o Compliance and Regulatory Requirements.
o Mitigation of Cyber Threats.
o Protection Against DDoS Attacks.
o Maintaining Business Continuity.
o Preventing Defacement and Data Manipulation.
Web Application Security
Practices
● Authentication and Authorization.
● Input Validation.
● Secure Communication.
● Secure Coding Practices.
● Regular Security Updates.
● Least Privilege Principle.
● Web Application Firewalls (WAF).
● Session Management.
Web Application Security Testing
● Web application security testing is the process of evaluating and assessing the
security aspects of web applications to identify vulnerabilities, weaknesses, and
potential security risks.
● It involves conducting various tests and assessments to ensure that web
applications are resistant to security threats and can effectively protect sensitive
data and functionalities from unauthorized access or malicious activities.
● The primary goal of web application security testing is to uncover security flaws
before they are exploited by attackers (Proactive Approach).
● By identifying and addressing vulnerabilities, organizations can enhance the
overall security posture of their web applications, reduce the risk of data
breaches and unauthorized access, and protect their users and sensitive
information (Bug Bounty Programs).
Web Application Penetration
Testing
● Web application pentesting, is a subset of web application security testing that
specifically involves attempting to exploit identified vulnerabilities.
● It is a simulated attack on the web application conducted by skilled security
professionals known as pentesters, bug bounty hunters or ethical hackers.
● The process involves a systematic and controlled approach to assess the
application's security by attempting to exploit known vulnerabilities.
Web App Pentesting vs Security
Testing
Security Terminologies