Module 1: Web Application Security Overview 1. Overview How Data is stored in a Web Application Types of Data that need to be secured Overview of common.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 4: Web Browsing.
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Interpret Application Specifications
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 19: Configuring Windows Firewall
Lesson 18: Configuring Application Restriction Policies
Topics in this presentation: The Web and how it works Difference between Web pages and web sites Web browsers and Web servers HTML purpose and structure.
Installing software on personal computer
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Internet safety By Lydia Snowden.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Internet Basics Dr. Norm Friesen June 22, Questions What is the Internet? What is the Web? How are they different? How do they work? How do they.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Module 10: Windows Firewall and Caching Fundamentals.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Module 8 Implementing Security Using Group Policy.
Here are some things you can do while you wait 1.Open your omeka.net site in your browser (e.g. 2.Open.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
Tutorial 1 Getting Started with Adobe Dreamweaver CS5.
Windows Vista Configuration MCTS : Network Security.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
4.01 How Web Pages Work.
Contents Software components All users in one location:
Chapter 6 Application Hardening
CONNECTING TO THE INTERNET
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 4: Security Baselines
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Designing IIS Security (IIS – Internet Information Service)
4.01 How Web Pages Work.
Presentation transcript:

Module 1: Web Application Security Overview 1

Overview How Data is stored in a Web Application Types of Data that need to be secured Overview of common security practices 2

3 How Data is Stored in a Web Application

How Data is stored in a web application A web application may need several different pieces of information to be gathered and processed before the site can be displayed in the browser This information could come from many different sources including but not limited to the sources below: –File System –Database –Directory Service –XML file –Distributed Storage System 4

Files System Many things are stored in folders on the web server and must be secured –Images –Video –Configuration files –Web Pages –AddIns –Components –.Net Assemblies 5

File System

Net Assemblies In the.NET framework, an assembly is a compiled code library for use in deployment, versioning and security There are two types: process assemblies (EXE) and library assemblies (DLL) An assembly can consist of one or more files.

XML file Extensible Markup Language (XML) is a set of rules for encoding documents in machine-readable form It is defined in the XML 1.0 Specification produced by the W3C XML's design goals emphasize simplicity and usability in data exchange over the Internet

XML Uses Store information about users Configuration files Order Information Data import/export 9

XML file

Configuration file Configuration files store the initial settings for some computer programs Used for user applications, server processes and operating system settings The files are often written in ASCII / XML format. These files may contain passwords and database connection strings or user information

Database User Information Authentication Info Authorization Info Order Info Employee Info –Salary –SSN –Address –Phone Number Credit Card Info 12

User Information

Authentication Information Used to Identify the user –User Name –Password –Domain or Network Name 14

Authorization Information Used to determine rights and resources access –Role/Group Membership –Access Control List 15

Authentication Info

Authorization Info

Credit Card Info

Content Deliver Network A system of computers containing copies of data, placed at various points in a network so as to maximize bandwidth for access to the data from clients throughout the network. Typical content stored: Images Video Audio Podcasts Other Distributed content 19

Distributed Storage System

Directory Service Active Directory –Login Info –Domain Info LDAP Store –Login Info –User MetaData 21

Directory Service

Active Directory

Active Directory- Login Info

Active Directory-Domain Info

26 Types of Data that need to be secured

Personally identifiable information Financial information Order Information Intellectual property Authentication Info 27

Types of Data that need to be secured Personally Identifiable Information (PII), as used in information security Information that can be used to uniquely identify, contact, or locate a single individual Can be exploited by criminals to stalk or steal the identity of a person

Personally identifiable information (PII)

Personally Identifiable Information (PII) PII is ancient, it has become much more important as information technology and the Internet have made it easier to collect PII Profitable market - Collecting and Reselling PII Many web site privacy policies specifically address the collection of PII, and lawmakers have enacted a series of legislation to limit the distribution and accessibility of PII.

Financial Information Credit Card Info –If you store credit card information and your storage engine is compromised you are potentially responsible for up to $250,000 per card Bank Account Info Best practice: Outsource storage and processing to a service provider that specializes in processing financial data processing and hold sufficient insurance 31

Order Information Payment Info Order Totals Shipping Address Billing Address 32

Intellectual Property DataBase Content –Store procedures and functions Application Architecture –Location and type of storage –Server Names Application Configuration 33

34 Overview of Common Security Practices

Overview of common security practices Hardening the server Patching Updating Firewalls Port forwarding and blocking 35

Hardening the server Server hardening consists lowering the attack surface of the server Use only Least Privileged Account LPA Install only required modules Disable unused services Install all required available patches Remove unused accounts from the server. Do not connect server to the Internet until it is fully hardened.

Hardening the server

RackSpace Server hardening KickStart process incorporate some post install processes Support is responsible for additional post install routines Different KickStart Images for Cloud, Intensive and Managed 38

Server hardening is accomplished manually during setup

Patching A patch is a piece of software designed to fix problems with, or update a computer program or its supporting data This includes fixing security vulnerabilities and other bugs, and improving the usability or performance Patch management is the process of using a strategy and plan of what patches should be applied to which systems at a specified time

Patching

A Typical Example For Updating To use this site, you must be running Microsoft Internet Explorer 5 or later To upgrade to the latest version of the browser, go to the Internet Explorer Downloads website If you prefer to use a different web browser, you can obtain updates from the Microsoft Download Center or you can stay up to date with the latest critical and security updates by using Automatic Updates

To turn on Automatic Updates: Click Start, and then click Control Panel. Depending on which Control Panel view you use, Classic or Category, do one of the following: –Click System, and then click the Automatic Updates tab. –Click Performance and Maintenance, click System, and then click the Automatic Updates tab. –Click the option that you want. Make sure Automatic Updates is not turned off.

Updating

Firewalls

A firewall is a part of a computer system or network that is designed to block unauthorized access It permits authorized communications Firewalls can be implemented in either hardware or software, or a combination of both

Firewall techniques Packet filter Application gateway Circuit-level gateway Proxy server

How Does a Firewall Work?

The earliest computer firewalls were simple routers.

Understanding and Using Firewalls

An example of a user interface for a firewall on Ubuntu (Gufw)

Port forwarding Port forwarding or port mapping is the technique of forwarding a TCP/IP packet Traversing a network address translator (NAT) gateway to a predetermined network port on a host within a NAT-masqueraded Typically private network based on the port number on which it was received at the gateway from the originating host

Port forwarding

Port blocking In order to set rules on specific ports, you need to access iptables Port Blocking - Block all users to port 80: –iptables -I INPUT -p tcp --dport 80 -j DROP Port Blocking - Block a SINGLE user to port 21: –iptables -I INPUT -s p tcp --dport 21 -j DROP

GFI Web Monitor installed on a proxy machine connected to a router supporting port blocking

Add or edit a port blocking

Review Components of a Web Application Types of Data that need to be secured Overview of common security practices 58

59