Chapter 3 Application and OS Security
Chapter 3 Application and OS Security
1
outlines
• Application security
• Application security attacks
• Features of Application Security
• Tools for application security
• Application Security Approaches
• Operating system security
• Key components of OS security
• Threats to OS
• Computer forensics
• Web security
• Mobile security
2
Application Security
• The goal of application security is to prevent unauthorized access, data breaches, and
other malicious activities that could compromise the confidentiality, integrity, and
availability of the application and its data.
14
Key Components of OS Security…..
• Examples of security policy: Acceptable Use Policy (AUP), Data Protection
Policy, Access Control Policy, Incident Response Policy, Password Policy,
Remote Work Policy:
• Security Procedures: are detailed, step-by-step instructions on how to implement the
security policies. They provide the specific actions required to achieve the security
objectives outlined in the policies.
• Key Characteristics of Security Procedures:
• Detailed and Specific: Procedures provide specific steps to be followed to ensure
compliance with security policies.
• Operational Focus: They are operational in nature and are used by staff to perform
daily security-related tasks.
• Consistency: Procedures ensure that security tasks are performed consistently and
correctly across the organization.
• Documentation: Detailed documentation of procedures helps in training employees
and serves as a reference during security operations.
15
Key Components of OS Security…..
• Examples of security procedures:
• Account creation: Step-by-step instructions for creating, modifying, and disabling
user accounts.
• Back up: Procedures for regularly backing up data and recovering it in the event of
data loss.
• Incident response steps: Detailed steps for detecting, reporting, and mitigating
security incidents, including communication protocols and documentation
requirements.
• Patch Management: procedures: Instructions for identifying, testing, and applying
software updates and patches to systems.
16
Threats to Operating System
There are various threats to the operating system. Some of them are as follows:
Malware: It contains viruses, worms, trojan horses, and other dangerous software. These
are generally short code snippets that may corrupt files, delete the data, replicate to
propagate further, and even crash a system. The malware frequently goes unnoticed by the
victim user while criminals silently extract important data.
Network Intrusion: Network intruders are classified as masqueraders, misfeasors, and
unauthorized users. A masquerader is an unauthorized person who gains access to a system
and uses an authorized person's account. A misfeasor is a legitimate user who gains
unauthorized access to and misuses programs, data, or resources. A rogue user takes
supervisory authority and tries to evade access constraints and audit collection.
Buffer Overflow: It is also known as buffer overrun. It is the most common and dangerous
security issue of the operating system. It is defined as a condition at an interface under
which more input may be placed into a buffer and a data holding area than the allotted
capacity, and it may overwrite other information. Attackers use such a situation to crash a
system or insert specially created malware that allows them to take control of the system.
17
Computer forensics
Computer forensics, also known as digital forensics, involves the identification,
preservation, analysis, and presentation of digital evidence. It plays a crucial role in legal
and information security contexts, particularly when dealing with cybercrimes, data
breaches, and other security incidents.
Key Aspects of Computer Forensics
•Identification: Identifying potential sources of digital evidence, such as computers, mobile
devices, servers, and cloud storage. it includes Determining the scope of the investigation
and the specific data required.
•Preservation: Chain of Custody: Maintaining a documented history of the evidence from
collection to presentation to ensure its integrity using methods like cryptographic hashing to
ensure that the data remains unchanged.
•Analysis: Employing various forensic techniques to analyze data, such as file recovery, log
analysis, and network traffic analysis by utilizing specialized tools like EnCase, FTK
(Forensic Toolkit), and open-source alternatives like Autopsy and Sleuth Kit.
•Presentation: Preparing detailed reports that summarize findings and methodologies.
Providing expert testimony in court to explain the evidence and its relevance.
18
Web security
• Web security involves protecting websites, web applications, and web services from
cyber threats and vulnerabilities. It encompasses a range of practices, tools, and
protocols designed to ensure the integrity, confidentiality, and availability of data and
resources on the web.
Key Concepts and Practices in Web Security:
1. Web Application Firewalls (WAFs)
•Purpose: Filter and monitor HTTP traffic between a web application and the internet.
•Functionality: Block malicious traffic, prevent common attacks like SQL injection,
cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks.
2. Secure Development Practices
•Input Validation: Ensure all user inputs are validated to prevent injection attacks.
•Output Encoding: Encode output data to prevent XSS attacks.
•Authentication and Authorization: Implement strong authentication mechanisms and
enforce proper authorization.
19
Key Concepts and Practices in Web Security…
3. Encryption
• HTTPS: Use SSL/TLS to encrypt data transmitted between the user’s browser and the web server.
• Data Encryption: Encrypt sensitive data stored on the server.
4. Session Management
• Secure Cookies: Use secure cookies with Http Only and Secure flags to protect session data.
• Session Expiry: Implement session timeouts to reduce the risk of session hijacking.
5. Content Security Policy (CSP)
• Purpose: Mitigate XSS attacks by controlling resources a browser is allowed to load and execute.
• Implementation: Define a CSP header that specifies allowed content sources.
6. Regular Security Testing
• Vulnerability Scanning: Regularly scan for vulnerabilities using automated tools.
• Penetration Testing: Conduct full penetration testing to identify and remediate security flaws.
7. Patch Management
• Timely Updates: update web servers, frameworks, and libraries to patch known vulnerabilities.
20
Best Practices for Enhancing Web Security:
•Regular Security Audits: Conduct regular security audits to identify and address
vulnerabilities.
•User Education: Train users on security best practices and raise awareness about social
engineering attacks.
•Backup and Recovery: Regularly back up web application data and have a robust
disaster recovery plan.
•Secure Configuration: Follow security best practices for configuring web servers,
databases, and applications.
NOTE: Web security is essential for protecting web applications and services from a
myriad of cyber threats. By implementing comprehensive security measures, adhering
to best practices, and staying alert through regular testing and monitoring, organizations
can safeguard their web environments and protect sensitive data from unauthorized
access and attacks.
21
Mobile security
• Mobile security refers to the protection of smartphones, tablets, and other mobile devices from threats
and vulnerabilities that can compromise data, privacy, and functionality. It involves a range of practices,
tools, and technologies designed to safeguard mobile devices, their applications, and the data they
handle.
Key Aspects of Mobile Security:
1. Device Security
•Encryption:
• Purpose: Protect data stored on the device.
• Implementation: Use built-in encryption features (e.g., iOS encryption, Android full-disk
encryption).
•Secure Boot:
• Purpose: Ensure that the device boots using only trusted software.
• Implementation: Use manufacturer-provided secure boot features to prevent unauthorized
modifications.
•Lock Screen Security:
• Purpose: Prevent unauthorized access to the device.
• Implementation: Use strong passcodes, biometric authentication (fingerprint, facial recognition),
22
and lock screen timeouts.
Key Aspects of Mobile Security ….
2. Application Security
•App Permissions:
• Purpose: Control the access apps have to device resources.
• Implementation: Review & limit app permissions to only what is necessary for their function.
•Secure Coding Practices:
• Purpose: Develop secure mobile applications.
• Implementation: Follow secure coding guidelines, perform code reviews, and use mobile-
specific security libraries.
•App Vetting:
• Purpose: Ensure the apps installed on devices are secure.
• Implementation: Use official app stores, and employ mobile application management (MAM)
solutions to vet apps.
3. Network Security
•VPNs (Virtual Private Networks)
•Secure Wi-Fi
•Network Monitoring 23
Risk management framework
A Risk Management Framework (RMF) is a structured approach used to identify, assess,
manage, and monitor risks within an organization. It provides a systematic process for
managing potential risks that could impact the achievement of the organization's objectives.
The RMF helps ensure that risk management activities are integrated into the organization's
overall governance, strategy, and operations.
Key Components of a Risk Management Framework
1. Establishing the Context:
o Define the internal and external environment in which the organization operates.
o Identify the objectives, stakeholders, and the risk criteria .
2. Risk Assessment:
o Risk Identification: Determine what risks might affect the organization.
o Risk Analysis: Understand the nature of the risk, its potential impact, and likelihood.
o Risk Evaluation: Compare the level of risk against risk criteria to prioritize them.
24
Key Components of a Risk Management Framework…..
3. Risk Treatment:
o Develop and implement strategies to mitigate, transfer, avoid, or accept risks.
o Select appropriate risk controls and measures.
4. Monitoring and Review:
o Continuously monitor the risk environment and the effectiveness of risk management
strategies.
o Review and update the risk management framework and processes as needed.
5. Communication and Consultation:
o Ensure effective communication and consultation with internal and external
stakeholders throughout the risk management process.
o Maintain transparency and promote a risk-aware culture within the organization.
25
Common Risk Management Frameworks
1. ISO 31000:
o An international standard providing guidelines and principles for effective risk management.
o Emphasizes integration into organizational processes, structured and comprehensive
approach, customized processes, and continual improvement.
2. NIST Risk Management Framework (RMF):
o Developed by the National Institute of Standards and Technology (NIST) for managing
risks to federal information systems.
o Includes steps such as preparing, categorizing, selecting, implementing, assessing,
authorizing, and monitoring security controls.
3. COSO Enterprise Risk Management (ERM):
o Provides a comprehensive framework for enterprise risk management, integrating with
the organization's strategy and performance.
o Focuses on governance, strategy, performance, review, and communication.
26
Steps in a Typical Risk Management Process
1. Establish Context: Define the scope, objectives, and risk criteria and understand the internal and
external environment.
2. Identify Risks: Identify potential events or conditions that could affect objective and use
techniques such as brainstorming, checklists, and SWOT analysis.
3. Analyze Risks: Determine the likelihood and impact of identified risks and use qualitative or
quantitative methods for risk analysis.
4. Evaluate Risks: Prioritize risks based on their analysis and decide which risks need treatment
and the urgency.
5. Treat Risks: Develop and implement risk treatment plans and consider options such as
avoidance, reduction, sharing, or acceptance.
6. Monitor and Review: Track the effectiveness of risk treatments and review and update risk
assessments regularly.
7. Communicate and Consult: Ensure stakeholders are informed about risks and risk
management activities and foster a culture of risk awareness and open communication . 27
you
a n k
T h s ?
t i on
ue s
Q
28