E-commerce Application Security

Slides:



Advertisements
Similar presentations
Incident Handling & Log Analysis in a Web Driven World Manindra Kishore.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
OWASP Web Vulnerabilities and Auditing
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Issues and Challenges in Cloud Computing
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
SiteLock Internet Security: Big Threats for Small Business.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Norman SecureSurf Protect your users when surfing the Internet.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
OWASP Zed Attack Proxy Project Lead
Juha Siivikko SECURITY IN SOCIAL MEDIA.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Attacks Against Database By: Behnam Hossein Ami RNRN i { }
Software Security Testing Vinay Srinivasan cell:
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Safeguarding your Business Assets through Understanding of the Win32 API.
Building Secure Web Applications With ASP.Net MVC.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Computer Security By Duncan Hall.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Web Applications on the battlefield Alain Abou Tass.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
How to Develop Secure Software using Agile Methods? Dr. Imran Ghani
Javascript worms By Benjamin Mossé SecPro
Web Application Vulnerabilities
TOPIC: Web Security (Part-4)
Do you know who your employees are sharing their credentials with
Common Methods Used to Commit Computer Crimes
ISYM 540 Current Topics in Information System Management
Secure Software Confidentiality Integrity Data Security Authentication
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Penetration Testing following OWASP
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Securing Information Systems
Cybersecurity Awareness
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
5 Techniques for a Proper Website Security Testing.
Risk of the Internet At Home
CSC 495/583 Topics of Software Security Intro to Web Security
Security Essentials for Small Businesses
Introduction to Computers
Information Security Awareness
Web Security Advanced Network Security Peter Reiher August, 2014
Lecture 2 - SQL Injection
Information Systems for Health:
Protecting your data with Azure AD
Intrusion.
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

E-commerce Application Security Ways to secure your application from hackers Building a software is easy, building a secure software is difficult…. Vulnerabilities are inevitable, hacking is not…

You can also view a recorded session of this presentation here! What is it all about ?? Importance of security in e-commerce Major attacks on e-commerce applications Common issues and vulnerabilities in applications What makes attackers target your application? Vulnerabilities that might be present in your application How do hackers attack your application? Do's and Dont's to improve application security You can also view a recorded session of this presentation here!

How security affects e-commerce? Tarnishes company’s reputation in public Huge financial loss due to post breach activities like email notification, patching, business loss etc. Image One breach invites many other hackers Loss of costumers trust Loss of business You can also view a recorded session of this presentation here!

Ecommerce Hacks What does eBay, Zappos (Amazon), Dominos and Starbucks have in common? They all suffered huge data breaches in the last few years. For more info checkout: Link

You can also view a recorded session of this presentation here! eBay Data Breach Attackers compromised a small number of employee log-in credentials, allowing unauthorized access to eBay’s corporate network The attack obtained user information such as dates of birth, names, email addresses, phone numbers, residential addresses and passwords (encrypted) Lessons to learn from this hack: Centralize Application Management Secure Employee Personal Accounts Ensure strong password policy Proactive stand for security You can also view a recorded session of this presentation here!

You can also view a recorded session of this presentation here! Starbucks Data Breach Starbucks mobile app was hacked twice in a period of few months Hackers stole money from several Starbucks customers by gaining access to their credit card information Criminals used Starbucks accounts to access consumers’ linked credit cards. They could steal hundreds of dollars in a matter of minutes. Lessons to learn from this hack: Securing the mobile application and backend API Proactive measure against the cyber attacks, like Penetration testing and vulnerability assessments You can also view a recorded session of this presentation here!

Commonly Exploited Vulnerabilities Injection Attacks like Sql Injection, leads to critical data loss Improper implementation of payment system and logical vulnerabilities X0RC0NF presentation: Link Insecure mobile application and backend API server Insecure direct object reference: Unrestricted access to subdomains Privilege Escalation and authorization bypass Cross Site Scripting: Hijacking accounts Improper Policy implementations, like weak passwords, insecure storage You can also view a recorded session of this presentation here!

You can also view a recorded session of this presentation here! Injection Attacks Injection attacks can result in data loss or corruption, lack of accountability, denial of access or complete host takeover. For e.g., Sql injection may lead to total compromise of your database. You can also view a recorded session of this presentation here!

Payment system and logical vulnerabilities Payment gateways are often found to be insecurely implemented that may lead to attacks like Payment forgery or restrictions bypass. Logical vulnerabilities are hard to discover but have huge impact on business. You can also view a recorded session of this presentation here!

Insecure mobile application and backend API server Protecting only the web applications from hackers is not sufficient. With the increased use of smart phones and tablets, the internet is flooded with mobile applications. These applications must also be secured from attacks along with proper implementations of API calls. Source: nerdwallet.com You can also view a recorded session of this presentation here!

Insecure direct object reference Insecure direct object reference means referencing an object such as a page or a file directly that was not meant to be directly referenced. Such insecure entry points are often discovered in applications while performing a pentest. Source: slideshare.net You can also view a recorded session of this presentation here!

Privilege Escalation and authorization bypass Privilege Escalation enables the attacker to compromise an user’s account by accessing those resources that are meant to be private. If the compromised account is that of an administrator, the attacker now controls the admin functionalities. Source: cyber-security-blog.com You can also view a recorded session of this presentation here!

You can also view a recorded session of this presentation here! Cross Site Scripting Attackers can execute scripts in a victim’s browser to hijack user sessions and steal cookies. This is one of the most common attack vectors that attackers use to steal credentials/tokens and perform targeted attacks Source: lifas.com You can also view a recorded session of this presentation here!

Improper Policy implementations- A Weak Password A weak password policy that allows the users to set a weak password makes the application vulnerable to attacks such as brute force and Password guessing. Source: betanews.com

You can also view a recorded session of this presentation here! Hacker’s Jackpot Credit card data, personal info like, phone number, address can be sold in black market Personal Info can be used for blackmailing and phishing Un-encrypted database can be sold very easily to competitors “If you're a @dominos_pizzafr customer, u may want to know that we have offered Domino's not to publish your data in exchange for €30,000,” -Tweet by hackers after Dominos Hack Financial services are amongst top 3 of most attacked services on internet -2015-DBIR (Verizon) You can also view a recorded session of this presentation here!

You can also view a recorded session of this presentation here! What Hacker’s look for? Unpatched servers, or network devices Insecure vulnerable implementation of known software's like WordPress Older/outdated software being used, with known publicly available exploits Common vulnerabilities like CSRF, XSS, lack of HTTPS, brute-forcing etc. Subdomains without proper authorization or public sensitive data “In our experience, 30-45% or applications have one or more than one critical vulnerability.” 47% of all breaches in 2015 study were caused by malicious or criminal attacks. -DBIR (Verizon) You can also view a recorded session of this presentation here!

You can also view a recorded session of this presentation here! How hackers attack? Choosing the weakest link to attack, web application, unpatched servers, employee credentials etc. Finding the vulnerability in web application to steal credentials or users and exploit One XSS in any page may lead to admin account compromise Search for any vulnerable implementation of known software like WordPress or Magento Hacking a weak WordPress blog is way easier than hacking the website itself Data exfiltration is done in an stealth mode You can also view a recorded session of this presentation here!

You can also view a recorded session of this presentation here! Safeguarding It might be dark, but the light is not very far  Proactively discover and remediate the application vulnerabilities in a timely manner A good penetration test will discover logical vulnerabilities and authorization issues too Make sure to assess all the subdomains, servers and all accessible portals. It’s not hidden if you have not provided a direct link Doing a small Google search will reveal many sub-domains “site:xyz.com -www” Ensure strong encryption and policy to be implemented on application and network Easy to find vulnerabilities affect the most, if not fixed. XSS, CSRF, file uploads etc. Always audit the application server together with the web application Mobile applications are becoming the easy target for hackers, make sure to assess it for vulnerabilities You can also view a recorded session of this presentation here!

Ways to Enhance the Security of Your E-commerce Applications MORE INSIGHTS……. To know more about, Application Security in E-commerce apps WEBINAR RECORDING Ways to Enhance the Security of Your E-commerce Applications VIEW NOW

Contact Us We are keen to know about your idea info@tothenew.com Email us at: info@tothenew.com abhinav.mishra@tothenew.com Our Office Client Location 20