UNIT -1 my notes
UNIT -1 my notes
Web security refers to the practices, technologies, and measures taken to protect
websites, web applications, and their users from various types of cyber threats,
attacks, and vulnerabilities.
2. Phishing: Fake websites or emails that trick users into revealing sensitive
information.
4. Cross-Site Scripting (XSS): Malicious code injected into websites to steal user
data or take control of user sessions.
5. Cross-Site Request Forgery (CSRF): Malicious code that tricks users into
performing unintended actions on web applications.
1. Encryption:
1. SQL Injection: Injecting malicious SQL code to access or modify sensitive data.
2. Cross-Site Scripting (XSS): Injecting malicious code into web pages to steal user
data or take control of user sessions.
Risk analysis :
A security risk assessment identifies, assesses, and implements key security controls in applications. It
also focuses on preventing application security defects and vulnerabilities. Carrying out a risk
assessment allows an organization to view the application portfolio holistically—from an attacker‘s
perspective. It supports managers in making informed resource allocation, tooling, and security control
implementation decisions. Thus, conducting an assessment is an integral part of an organization‘s risk
management process..
Factors such as size, growth rate, resources, and asset portfolio affect the depth of risk assessment
models. Organizations can carry out generalized assessments when experiencing budget or time
constraints. However, generalized assessments don‘t necessarily provide the detailed mappings
between assets, associated threats, identified risks, impact, and mitigating controls.
If generalized assessment results don‘t provide enough of a correlation between these areas, a more
indepth assessment is necessary.
The 4 steps of a successful security risk assessment model:
1. Identification. Determine all critical assets of the technology infrastructure. Next, diagnose sensitive
data that is created, stored, or transmitted by these assets. Create a risk profile for each.
2. Assessment. Administer an approach to assess the identified security risks for critical assets. After
careful evaluation and assessment, determine how to effectively and efficiently allocate time and
resources towards risk mitigation. The assessment approach or methodology must analyze the
correlation between assets, threats, vulnerabilities, and mitigating controls.
3. Mitigation. Define a mitigation approach and enforce security controls for each risk.
4. Prevention. Implement tools and processes to minimize threats and vulnerabilities from occurring in
your firm‘s resources.
A comprehensive security assessment allows an organization to: Identify assets (e.g., network, servers,
applications, data centers, tools, etc.) within the organization.
. Assess asset criticality regarding business operations. This includes the overall impact to revenue
, reputation, and the likelihood of a firm‘s exploitation. Measure the risk ranking for assets and
prioritize them for assessment.
Encryption: Utilize AES (Advanced Encryption Standard) with a key size of 128 bits or
higher for encrypting sensitive data.
Hashing: Use SHA-256 or SHA-3 for hashing passwords and sensitive data.
Public Key Cryptography: Employ RSA with at least 2048-bit keys or Elliptic Curve
Cryptography (ECC) for secure key exchanges.
2. Implement SSL/TLS
HTTPS: Ensure all communications between users and servers are encrypted using
HTTPS.
Certificates: Use certificates from trusted Certificate Authorities (CAs) and keep them
up-to-date.
TLS Versions: Always use the latest version of TLS (currently TLS 1.3) to avoid
vulnerabilities in older versions.
3. Secure Key Management
Key Storage: Store keys securely using hardware security modules (HSM) or secure key
management services.
Key Rotation: Regularly rotate encryption keys to limit the exposure if a key is
compromised.
Disk Encryption: Encrypt sensitive data stored on disks using Full Disk Encryption
(FDE).
Database Encryption: Utilize transparent data encryption (TDE) for encrypting
databases.
Input Validation: Validate and sanitize all user inputs to prevent injection attacks.
Least Privilege: Follow the principle of least privilege for accessing and managing
sensitive data.
Code Reviews: Conduct regular code reviews and security audits to identify and fix
vulnerabilities.
Patch Management: Keep software, libraries, and dependencies up-to-date with the
latest security patches.
Vulnerability Scanning: Perform regular vulnerability assessments and penetration
testing.
Digital Identification :