SlideShare a Scribd company logo
Web Security
Presentation Speaker:
Padam Banthia
What is web security?
Almost everything relies on computers and the Internet
now
 Communication
 transportation
 medicine
 shopping
 Entertainment
Web Security, also known as “Cyber security” involves
protecting that information by preventing, detecting,
and responding to attacks.
Web security
Web Security Issues
 Malicious websites:- Malicious websites
China - 67%
US - 15%
Russia - 4%
Malaysia- 2.2%
Korea - 2%
 SPAM:-Spam is unsolicited e-mail on the Internet.
 Phishing:-This is a method of luring an unsuspecting user into
giving out their username and password for a secure web resource,
usually a bank or credit card account.
 DDOS-Web server can handle a few hundred connections/sec before
performance begins to degrade. Web servers fail almost instantly
under five or six thousand connections/sec
 Botnets:-A botnet is a collection of compromised computers (called
zombie computers) running programs, usually installed via worms,
Trojan horses, or backdoors, under a common command and control
infrastructure.
Web security
Web security
Develop: Role-based security
• Java EE security uses roles to determine categories of users
that can access a particular enterprise application
– A role is an abstract group mapped to a set of security
identities during deployment.
– Groups are similar to roles, but apply to all enterprise
projects in the application server.
/reportcardInfo.jsp
/maintainUsersInfo.jsp
Web application
Role = Administrator
Role = Student
Define security roles for Web
applications
1. Define security roles in the Security details section
of the Web Deployment Descriptor editor
– Roles represent categories of users that can
access the Web application
Constrain access based on security role
2. Set Security Constraints
details for the Web
application:
a. List which Web
resources apply to the
security constraint in the
Web resource
collection
b. Define which roles are
authorized to use the
Web resource collection
in the Authorized Roles
Gather roles in the enterprise application
3. In the Enterprise Application Deployment
Descriptor editor, click the Open WebSphere
Bindings link
4. Add Security Role and specify name in the details
section
Web container client authentication
• Authentication methods for a Web application client:
– Basic authentication
• Client sends user name and password in the HTTP header using base64
encoding.
– Form-based authentication
• Client sends user name and password in an HTML form
• Sent in an HTTP Post request in plain text.
– Digest authentication
• Client sends an MD5 (Message-Digest algorithm 5) hash based on the user
name, password, URI resource, and other information.
– Certificate-based authentication
• Client uses a digital certificate to uniquely identify itself
– A trusted third-party, known as a certificate authority (CA) issues
digital certificates.
– Digital certificates include a unique serial number, identification
information, and the user’s public key.
Configure client authentication method
1. In the Web Deployment Descriptor, add Login
Configuration item and specify the following details.
a. For basic authentication, enter an arbitrary realm name
b. For form authentication, specify both a Login page and
an Error page
Declarative and programmatic security
• Web application security configured using a declarative model
• Web applications can view security information programmatically
– The following three methods from HttpServletRequest provides information on
the security context:
• getRemoteUser()
– Returns the user name that the client used for authentication
– Returns null if no user is authenticated
• isUserInRole(String name)
– Returns true if the remote user is granted the specified security role
– If the remote user is not granted the specified role, or if no user is
authenticated, it returns false
• getUserPrincipal()
– Returns the java.security.Principal object containing the remote user
name
– If no user is authenticated, it returns null
Define security role references
• Use security role references to avoid hard-coding Java EE security role names into
programmatic security calls
– Reference acts as an alias to the actual security role name
– Per servlet setting, set in the Security Role Reference list within the Servlets
section in the Web Deployment Descriptor
Enterprise application security overview
• WebSphere Application Server is built upon several layers of security:
– The operating system protects WebSphere configuration files, and
provides user authentication when using the local OS user registry
– The Java Virtual Machine (JVM) provides standard Java security
– Java™ 2 Security builds upon standard Java security
• Fine-grained access control
• Configurable security policy
• Security checks for all Java applications
– Java™ EE Security provides standard, container-level security
• Insulates enterprise applications from the actual security
implementation
• Classifies clients into roles, each with different access levels for a
given resource
WebSphere environment security layers
Platform Security
Operating System
Java Security
Java Virtual Machine
Java 2 Security
JCE JAAS JSSE
Java EE Security
Java EE Security
WebSphere Security
Transport Security
HTTP IIOP LDAP
Client Security
Client application / external component
Don’t we
all wish it
was that
easy!!!!
Web security
Penetrate : OWASP
 The Open Web Application Security Project
(OWASP) is a worldwide not-for-profit
charitable organization focused on
improving the security of software.
 At OWASP you’ll find free and open
Application security tools, complete books,
standard security controls and libraries,
cutting edge research
 http://www.owasp.org
7 Security (Mis)Configurations
in web.xml
1. Error pages not configured
2. Authentication & Authorization
Bypass
3. SSL Not Configured
4. Not Using the Secure Flag
5. Not Using the HttpOnly Flag
6. Using URL Parameters for
Session Tracking
7. Not Setting a Session Timeout
Protect
• [SWAT] Checklist
• Firewalls
• IDS and IDPs
• Audits
• Penetration Tests
• Code Reviews with Static
• Analysis Tools
Relax
• Web App Firewalls: Imperva, F5, Breach
• Open Source: WebNight and ModSecurity
• Stateful Firewalls: Juniper, Check Point, Palo Alto
• IDP/IDS: Sourcefire, TippingPoint
• Open Source: Snort
• Audits: ENY, PWC, Grant Thornton
• Pen Testing: WhiteHat, Trustwave, Electric Alchemy
• Open Source: OWASP ZAP
• Static Analysis: Fortify, Veracode
Decide!!! Who you are….
Thank You
“Security is a quality, and as
all other quality, it is
important that we build it
into our apps while we are
developing them, not
patching it on afterwards
like many people do.”
- Erlend Oftedal
Speaker:-
Padam Banthia
Ad

More Related Content

What's hot (20)

Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
DVWA(Damn Vulnerabilities Web Application)
DVWA(Damn Vulnerabilities Web Application)DVWA(Damn Vulnerabilities Web Application)
DVWA(Damn Vulnerabilities Web Application)
Soham Kansodaria
 
Web security
Web securityWeb security
Web security
kareem zock
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
Sajid Hasan
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
n|u - The Open Security Community
 
Xss attack
Xss attackXss attack
Xss attack
Manjushree Mashal
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration
Tariq Islam
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Jannis Kirschner
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
Rapid Purple
 
OWASP Top Ten
OWASP Top TenOWASP Top Ten
OWASP Top Ten
Christian Heinrich
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
DVWA(Damn Vulnerabilities Web Application)
DVWA(Damn Vulnerabilities Web Application)DVWA(Damn Vulnerabilities Web Application)
DVWA(Damn Vulnerabilities Web Application)
Soham Kansodaria
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
Sajid Hasan
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration
Tariq Islam
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Jannis Kirschner
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
Rapid Purple
 

Viewers also liked (20)

Flood
FloodFlood
Flood
Padam Banthia
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web Security
Bill Condo
 
Web security
Web securityWeb security
Web security
rakesh bandaru
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
Michael Peters
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
rajakhurram
 
Web Security
Web SecurityWeb Security
Web Security
ADIEFEH
 
Web Security
Web SecurityWeb Security
Web Security
Tripad M
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
Oles Seheda
 
Facebook Attacks
Facebook AttacksFacebook Attacks
Facebook Attacks
n|u - The Open Security Community
 
Pollution, Disaster Management
Pollution, Disaster ManagementPollution, Disaster Management
Pollution, Disaster Management
saurabhran
 
Crisis migratoria europea
Crisis migratoria europeaCrisis migratoria europea
Crisis migratoria europea
Steve Jobs
 
phising netiqueta
phising netiquetaphising netiqueta
phising netiqueta
ticteresabravo
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
kinish kumar
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012
jakobkorherr
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
Jim Manico
 
Web Security
Web SecurityWeb Security
Web Security
Gerald Villorente
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009
mirahman
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
Cisco Canada
 
Web Security
Web SecurityWeb Security
Web Security
Randy Connolly
 
Modern Web Security
Modern Web SecurityModern Web Security
Modern Web Security
Bill Condo
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
rajakhurram
 
Web Security
Web SecurityWeb Security
Web Security
ADIEFEH
 
Web Security
Web SecurityWeb Security
Web Security
Tripad M
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
Oles Seheda
 
Pollution, Disaster Management
Pollution, Disaster ManagementPollution, Disaster Management
Pollution, Disaster Management
saurabhran
 
Crisis migratoria europea
Crisis migratoria europeaCrisis migratoria europea
Crisis migratoria europea
Steve Jobs
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
kinish kumar
 
Introduction to web security @ confess 2012
Introduction to web security @ confess 2012Introduction to web security @ confess 2012
Introduction to web security @ confess 2012
jakobkorherr
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
Jim Manico
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009
mirahman
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
Cisco Canada
 
Ad

Similar to Web security (20)

ASP.NET security vulnerabilities
ASP.NET security vulnerabilitiesASP.NET security vulnerabilities
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
Top web apps security vulnerabilities
Top web apps security vulnerabilitiesTop web apps security vulnerabilities
Top web apps security vulnerabilities
Aleksandar Bozinovski
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
Spring Security services for web applications
Spring Security services for web applicationsSpring Security services for web applications
Spring Security services for web applications
StephenKoc1
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
Ben Abdallah Helmi
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
Ben Abdallah Helmi
 
Security testing
Security testingSecurity testing
Security testing
Tabăra de Testare
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
Richard Sullivan
 
Owasp web security
Owasp web securityOwasp web security
Owasp web security
Pankaj Kumar Sharma
 
T04505103106
T04505103106T04505103106
T04505103106
IJERA Editor
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
WebStackAcademy
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
FernandoVizer
 
Java Web Programming [9/9] : Web Application Security
Java Web Programming [9/9] : Web Application SecurityJava Web Programming [9/9] : Web Application Security
Java Web Programming [9/9] : Web Application Security
IMC Institute
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
Prateek Jain
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
Zakaria SMAHI
 
C01461422
C01461422C01461422
C01461422
IOSR Journals
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
karthikvcyber
 
Web applications security conference slides
Web applications security  conference slidesWeb applications security  conference slides
Web applications security conference slides
Bassam Al-Khatib
 
Top web apps security vulnerabilities
Top web apps security vulnerabilitiesTop web apps security vulnerabilities
Top web apps security vulnerabilities
Aleksandar Bozinovski
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
Spring Security services for web applications
Spring Security services for web applicationsSpring Security services for web applications
Spring Security services for web applications
StephenKoc1
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
Richard Sullivan
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
WebStackAcademy
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
FernandoVizer
 
Java Web Programming [9/9] : Web Application Security
Java Web Programming [9/9] : Web Application SecurityJava Web Programming [9/9] : Web Application Security
Java Web Programming [9/9] : Web Application Security
IMC Institute
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
Prateek Jain
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
Zakaria SMAHI
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
karthikvcyber
 
Web applications security conference slides
Web applications security  conference slidesWeb applications security  conference slides
Web applications security conference slides
Bassam Al-Khatib
 
Ad

Recently uploaded (20)

AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 

Web security

  • 2. What is web security? Almost everything relies on computers and the Internet now  Communication  transportation  medicine  shopping  Entertainment Web Security, also known as “Cyber security” involves protecting that information by preventing, detecting, and responding to attacks.
  • 4. Web Security Issues  Malicious websites:- Malicious websites China - 67% US - 15% Russia - 4% Malaysia- 2.2% Korea - 2%  SPAM:-Spam is unsolicited e-mail on the Internet.  Phishing:-This is a method of luring an unsuspecting user into giving out their username and password for a secure web resource, usually a bank or credit card account.  DDOS-Web server can handle a few hundred connections/sec before performance begins to degrade. Web servers fail almost instantly under five or six thousand connections/sec  Botnets:-A botnet is a collection of compromised computers (called zombie computers) running programs, usually installed via worms, Trojan horses, or backdoors, under a common command and control infrastructure.
  • 7. Develop: Role-based security • Java EE security uses roles to determine categories of users that can access a particular enterprise application – A role is an abstract group mapped to a set of security identities during deployment. – Groups are similar to roles, but apply to all enterprise projects in the application server. /reportcardInfo.jsp /maintainUsersInfo.jsp Web application Role = Administrator Role = Student
  • 8. Define security roles for Web applications 1. Define security roles in the Security details section of the Web Deployment Descriptor editor – Roles represent categories of users that can access the Web application
  • 9. Constrain access based on security role 2. Set Security Constraints details for the Web application: a. List which Web resources apply to the security constraint in the Web resource collection b. Define which roles are authorized to use the Web resource collection in the Authorized Roles
  • 10. Gather roles in the enterprise application 3. In the Enterprise Application Deployment Descriptor editor, click the Open WebSphere Bindings link 4. Add Security Role and specify name in the details section
  • 11. Web container client authentication • Authentication methods for a Web application client: – Basic authentication • Client sends user name and password in the HTTP header using base64 encoding. – Form-based authentication • Client sends user name and password in an HTML form • Sent in an HTTP Post request in plain text. – Digest authentication • Client sends an MD5 (Message-Digest algorithm 5) hash based on the user name, password, URI resource, and other information. – Certificate-based authentication • Client uses a digital certificate to uniquely identify itself – A trusted third-party, known as a certificate authority (CA) issues digital certificates. – Digital certificates include a unique serial number, identification information, and the user’s public key.
  • 12. Configure client authentication method 1. In the Web Deployment Descriptor, add Login Configuration item and specify the following details. a. For basic authentication, enter an arbitrary realm name b. For form authentication, specify both a Login page and an Error page
  • 13. Declarative and programmatic security • Web application security configured using a declarative model • Web applications can view security information programmatically – The following three methods from HttpServletRequest provides information on the security context: • getRemoteUser() – Returns the user name that the client used for authentication – Returns null if no user is authenticated • isUserInRole(String name) – Returns true if the remote user is granted the specified security role – If the remote user is not granted the specified role, or if no user is authenticated, it returns false • getUserPrincipal() – Returns the java.security.Principal object containing the remote user name – If no user is authenticated, it returns null
  • 14. Define security role references • Use security role references to avoid hard-coding Java EE security role names into programmatic security calls – Reference acts as an alias to the actual security role name – Per servlet setting, set in the Security Role Reference list within the Servlets section in the Web Deployment Descriptor
  • 15. Enterprise application security overview • WebSphere Application Server is built upon several layers of security: – The operating system protects WebSphere configuration files, and provides user authentication when using the local OS user registry – The Java Virtual Machine (JVM) provides standard Java security – Java™ 2 Security builds upon standard Java security • Fine-grained access control • Configurable security policy • Security checks for all Java applications – Java™ EE Security provides standard, container-level security • Insulates enterprise applications from the actual security implementation • Classifies clients into roles, each with different access levels for a given resource
  • 16. WebSphere environment security layers Platform Security Operating System Java Security Java Virtual Machine Java 2 Security JCE JAAS JSSE Java EE Security Java EE Security WebSphere Security Transport Security HTTP IIOP LDAP Client Security Client application / external component
  • 17. Don’t we all wish it was that easy!!!!
  • 19. Penetrate : OWASP  The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software.  At OWASP you’ll find free and open Application security tools, complete books, standard security controls and libraries, cutting edge research  http://www.owasp.org
  • 20. 7 Security (Mis)Configurations in web.xml 1. Error pages not configured 2. Authentication & Authorization Bypass 3. SSL Not Configured 4. Not Using the Secure Flag 5. Not Using the HttpOnly Flag 6. Using URL Parameters for Session Tracking 7. Not Setting a Session Timeout
  • 21. Protect • [SWAT] Checklist • Firewalls • IDS and IDPs • Audits • Penetration Tests • Code Reviews with Static • Analysis Tools
  • 22. Relax • Web App Firewalls: Imperva, F5, Breach • Open Source: WebNight and ModSecurity • Stateful Firewalls: Juniper, Check Point, Palo Alto • IDP/IDS: Sourcefire, TippingPoint • Open Source: Snort • Audits: ENY, PWC, Grant Thornton • Pen Testing: WhiteHat, Trustwave, Electric Alchemy • Open Source: OWASP ZAP • Static Analysis: Fortify, Veracode
  • 23. Decide!!! Who you are….
  • 24. Thank You “Security is a quality, and as all other quality, it is important that we build it into our apps while we are developing them, not patching it on afterwards like many people do.” - Erlend Oftedal Speaker:- Padam Banthia

Editor's Notes