The document discusses application security (AppSec), emphasizing the importance of safeguarding software applications from threats throughout their lifecycle, including planning, design, implementation, and maintenance. It highlights various types of application security, including mobile, web, and desktop application security, and outlines best practices such as secure coding, strong authentication, and regular security audits. Additionally, it covers the significance of addressing vulnerabilities and the impact of malicious programs, including viruses, worms, and phishing attacks on application security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
14 views42 pages
Chapter Five IAS 2017
The document discusses application security (AppSec), emphasizing the importance of safeguarding software applications from threats throughout their lifecycle, including planning, design, implementation, and maintenance. It highlights various types of application security, including mobile, web, and desktop application security, and outlines best practices such as secure coding, strong authentication, and regular security audits. Additionally, it covers the significance of addressing vulnerabilities and the impact of malicious programs, including viruses, worms, and phishing attacks on application security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42
Samara University
College of Engineering and
Technology Department of Information Technology Information Assurance and Security (ITec4133) 4th Year IT Chapter Five Application Security
By Jemal Gugsa (Msc)
April 25, 2025. Application Security (AppSec) • Application security • Testing - Verifying and (AppSec) is the practice of validating the software. implementing security • Deployment- Releasing the measures and safeguards to software. protect software • Maintenance - Supporting applications from threats and updating the software and vulnerabilities throughout their lifecycle. • Application security • Planning encompasses all aspects • Requirement gathering of securing applications, • Design from initial design to • Implementation – Writing the maintenance. programming code. Continued • Application security is the Why is Application practice of using security Security Important? software and best practices to 1. Protecting private protect computer applications information or data of the from external security threats. application users. • Application through Mobile, 2. Preventing an web, PCs, tablets provides organization from services which contains user financial damage. personal information. 3. Maintaining Confidentiality, Integrity and Availability. Continued • With new applications, new security • Application security helps vulnerabilities are also discovered. This vulnerability can put personal identify, fix and prevent data of user at risk. security • Once an attacker has found vulnerabilities in any kind application vulnerability and determined how to access it, it can of software application. exploit the application vulnerability • Web application to facilitate a cyber-crime. • These crimes target the CIA of • Desktop application resources possessed by an • Mobile application application. Types of Application Security • Securing web, mobile, • These measures help and desktop protect against various applications involves a threats like malicious, layered approach, phishing, and including strong authentication and unauthorized access. authorization, data encryption, secure coding, regular security audits and continuous monitoring. A) Mobile Application Security • Mobile application security refers to the technologies and security procedures that protect mobile applications against cyberattacks and data theft. • In Developer Level • In End Users Level Continued • Mobile device usage has • Traditionally a headache been steadily increasing reserved for celebrities in recent years. and are now a legitimate • Recent statistics note concern for anyone who that owns a cell phone. about 90% of the global in • Mobile applications are ternet population crucial today for uses a mobile device to businesses and personal go online. use. • For hackers, this means • Each year, the number of more people to victimize, mobile apps developed is making increasing – with the endpoint security for mobi increasing number of Continued • However, as mobile • Furthermore, if a business applications increase, it gives is in the process of more chances to hackers to penetrate thousands of devices developing their own app, – mobile apps have become they have to make sure their gateway to steal that it is secured from consumer data. hackers. • Businesses also use mobile apps in the workplace, therefore, it is necessary to take careful consideration and implement policies for protection. Mobile application Security practice 1. Secure Development 3. Strong Authentication Lifecycle (SDLC) • Implementing robust user • Integrating security authentication considerations into every mechanisms, such as multi- phase of development, from factor authentication. planning to maintenance. • Programmer Level • Programmer Level 4. Secure Authorization 2. Secure Coding • Ensuring users can only Practices access the features and • Writing code that minimizes data they are permitted to. common vulnerabilities • Programmer Level • Programmer Level Continued 5. Session Management End users security practice • Protecting user sessions • Use antivirus software from hijacking. • Set Strong password and • Programmer Level you will periodically 6. Programmer Level change it. (Others) • Delete apps. If you see any • Input Validation apps on your phone that you didn’t download, • Regular Updates delete them. • Monitoring and Logging • Report to administrative • User Education body • Incident Response B) Web Application Security • A web application is software that runs on a web server and is accessible via the Internet. Internet exposes them to a range of vulnerabilities. • Web application security is the practice of protecting websites, web applications, and web services from various threats and user information are safe from malicious attacks. Continued • The evolution of the Internet has addressed some web application vulnerabilities – such as the introduction of HTTPS, which creates an encrypted communication channel. • Application security, have introduced solutions especially designed to secure web applications. • Examples include the web application firewall (WAF), a security tool designed to detect and block application-layer attacks. Web application Security practice 1. Secure Communication: 4. Secure Coding Practices • HTTPS/TLS Encryption 5. Web Application Firewalls 2. Enforcing strong (WAFs) authentication and authorization. 6. Access Control and Least • Strong Authentication Privilege • MFA 7. Monitoring and Logging 3. Input Validation • Alerting C) Desktop Application Security • Desktop application security focuses on protecting software installed and running directly on a user's computer from security threats and risks. • These applications often handle sensitive data and have direct access to system resources, making their security crucial. Continued • Desktop application security involves practices and measures • Once inside your computer, these implemented to protect desktop can spread quickly to your apps software from various threats and vulnerabilities. and throughout your network. • Viruses or malware, whatever you call it, this is one of the most common risks to desktop apps. Vulnerabilities • Vulnerability is a • Weakness weakness in an IT system • A vulnerability is a flaw, error, or that can be exploited by gap in a system and process. an attacker to deliver a • Exploitability successful attack. • It's a weakness that an attacker can • They can occur through take advantage of to compromise the system. flaws, features or user error. It can be a flaw in • Potential for harm software, hardware, • Vulnerabilities can lead to data breaches, unauthorized access, network, or even human system crashes, or other negative practices. outcomes. The Importance of Application Security • Application security is • Reducing the Attack Surface crucial for protecting • Cost-Effectiveness: software from vulnerabilities • Addressing application and cyber threats, ensuring security vulnerabilities during data integrity and development and deployment confidentiality. is more cost-effective than trying to fix them after a • It's vital for safeguarding breach has occurred. sensitive data and maintaining business continuity. Malicious Program (Code) • Malicious Program (code) ,is software program (code) to harm or exploit computer systems, networks, or users. Which is developed by a programmer. • Malicious Program can take various forms, including viruses, worms, trojan horses, ransomware, spyware, and adware. Continued • According to SPECTRIA InfoSec Services, malicious code is defined as software which interferes with the normal operation of a computer system or software, which executes without the express consent of the user. • Perhaps the most sophisticated types of threats to computer systems are presented by malicious codes that exploit vulnerabilities in computer systems. • Any code which modifies or destroys data, steals data, allows unauthorized access Exploits or damage a system, and does something that user did not intend to do, is called malicious code. Continued • Its intent is typically to 3. Think twice before clicking links • Disrupt and Damage or downloading anything. • Gain unauthorized access to 4. Don't trust pop-up windows computer systems asking you to download software. • Generally, compromising the 5. Use Strong Passwords CIA of data. 6. Enable MFA Users should uses security 7.Enable Firewall measures (General Measures) such ; 8.Back Up Your Data 1. Keep Software Updated 2. Use Antivirus Software Types of malicious code 1. Viruses, is a program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. 2. Worms, is a standalone malware computer program that replicates itself in order to spread to other computers. • No need of executing the infected program when the worms are propagated. Continued • Computer viruses are Computer Virus malicious programs that • Infection: require a host file to • Requires a user to open the infected file or execute the program containing the infect a system. virus. • While computer • Replication: worms are standalone • Spreads by being copied and distributed programs that can self- as part of the host file. replicate and spread • Example: across networks without • A virus attached to an email attachment a host file. or a macro in a Microsoft Office document. Continued Computer Worms • Example: • Infection: • The Morris worm was a • Worms can exploit vulnerabilities famous example of a in software to enter a system and worm that exploited replicate themselves. vulnerabilities in Unix systems. • Replication: • Most of the time worm • Worms spread by automatically attack an OS level. replicating themselves across networks and infecting vulnerable systems. Continued • Executable files, such as • When an infected file is those with the .exe executed, the virus code or .com extensions, are is activated, potentially most frequently targeted causing damage or by computer viruses and spreading to other files on worms. the system. • These files are designed to be run by the operating system, and viruses can exploit this by attaching themselves to them. Continued 3. Trojan horses • A Trojan horse, in the context of cybersecurity, is a type of malicious program that pretend to be itself as legitimate software to trick users into downloading and running it on their systems. • A Trojan horse usually carries a hidden destructive function that is activated when the application is started. Continued • It's named after the legendary Greek wooden horse used to infiltrate the city of Troy. • Unlike viruses or worms, Trojans don't self- replicate; they require a user to initiate their execution. • Once activated, they can cause various harm, such as stealing data, gaining unauthorized access, or installing other malware. Continued 4. Spyware • Spyware is a type of malicious software that secretly collects information from a computer or device and sends it to a third party without the user's knowledge. • Spyware can capture keystrokes, monitor website visits, track browsing history, and even access the camera and microphone. Continued 5. Adware • It is software that displays unwanted advertisements, often installed unknowingly by users. • It that can disrupt browsing and potentially collect user data. Some adware can also be spyware. Continued • It generates revenue for its Potential for harm: developers by displaying • In addition to disrupting ads, which can appear as the user experience, pop-ups in browser. adware can also Data collection: potentially harm a device • Adware can collect by slowing it down, information about users' hijacking the browser, or browsing habits, which can even installing viruses or be used for targeted spyware. advertising or potentially shared with third parties. Continued 6. Trapdoor (Backdoor) Malicious Uses: • In cybersecurity it is refers to a hidden mechanism that allows • However, backdoors someone to bypass normal security protocols and gain can also be exploited unauthorized access to a system. by attackers to gain Legitimate Uses: unauthorized access • Sometimes, backdoors are intentionally included by to systems and developers for legitimate data. purposes, such as troubleshooting or system maintenance Continued 7. keylogger • A keylogger is a type of software or hardware that secretly records the keystrokes and other input data on a computer or device, essentially acting as a spy on your actions. • It can be used for malicious purposes, such as stealing passwords, credit card information, or other sensitive data. Continued • Keyloggers are a 1. Software-based keyloggers: particularly insidious type • These are programs installed on a of spyware. computer that record every keystroke and other input data, • However, keyloggers can which is then sent to a remote also enable cybercriminals server controlled by the attacker. to eavesdrop on you, 1. Hardware-based keyloggers: watch you on your system • These are devices physically connected to the computer's camera, or listen over keyboard or other input devices, your smartphone’s intercepting and recording the microphone. input data. Continued Malicious purposes: Legitimate uses: 1. Stealing passwords, 1. Parental monitoring of usernames, and other children's online login credentials. activities. 2. Accessing financial 2. Employee productivity accounts monitoring. 3. Theft of personal 3. Legal investigations information (Identity (with proper theft and fraud) authorization). Continued 8. Zombie: • A zombie is a program that secretly takes over another internet attached computer and then uses that computer to launch attacks that are difficult to trace to the zombie‘s creator. • Zombies are used in Denial of service attacks, typically against targeted web sites. Continued 9. Phishing • It is fraudulent (ማጭበርበር) emails, text messages, phone calls to trick users into sharing sensitive information or personal data. • The attacker's goal is to steal money, gain access to sensitive data and login information, or to install malware on the victim's device. Continued • Successful phishing attacks • Social engineering attacks often lead to identity theft, rely on human error and credit card fraud, ransomware attacks, data breaches, and pressure tactics for huge financial losses for success. individuals and corporations. • Phishing is the most common type of social engineering, the practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people. General Classification of Computer Virus 1) Memory-Resident Virus 4) Stealth Virus (ስውርነት) • Main system memory. Whenever • A virus which uses various the operating system executes a file, stealth techniques in order to • example, a program file (C). hide itself from detection by anti-virus software. 2) Program File Virus • This will infect programs like .EXE. 5) Email virus • A virus spread by email messages. 3) Boot Sector Virus • This type will infect the system 6) Macro Virus (Word documents area of a disk. files) Tips for Preventing Computer Virus 1. Install antivirus or 7. Keep your personal 2. Keep your antivirus information secure software up to date 8. Don’t use unsecured 3. Run antivirus scans Wi-Fi regularly 9. Back up your files 4. Keep your operating 10. Use different system up to date passwords 5. Think before you click suspicious link Symptoms of infected computers by virus 1. A program takes longer time 4. Popping up of new than usual to execute. windows or browser 2. A sudden reduction in advertisements. system memory or available 5. Abnormal restarts or disk space. shutdowns of the computer. 3. A number of unknown or new files, programs or processes on the computer. The life cycle of a computer virus • The life cycle of a 2. Propagation phase computer virus can be • In the propagation phase, the divided into four phases: virus starts propagating by replicating itself. 1. Dormant phase • The virus places a copy of • The virus is idle in the itself into other programs or dormant phase. It has accomplishes certain system accessed the target device areas on the disk. but does not take any • Each infected program will action. contain a clone of the virus, • Note: Not all viruses have which will enter its own the dormant phase. propagation phase as well. Continued 3. Triggering phase • The triggering phase starts when the dormant virus is activated. It will perform the actions it is supposed to accomplish. 4. Execution phase • In the execution phase, the payload will be released. It can harm deleting files, crashing the system, and so on. • It can be harmless too and pop some humorous messages on screen. End