4-2 Mitigating Website Risks, Threats, and Vulnerabilities

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

E-commerce websites need a . . .

clear understanding of the traffic visiting their site for security and marketing purposes.

2
New cards

Web analytics software can provide:

- Visitor location

- Visitor sources

- Visitor type

- Visitor navigation

- Average time on site

- Leave (bounce) rate

3
New cards

Google Analytics is a . . .

common web analytics software package with an easy-to-navigate graphical interface.

4
New cards

Google Dashboard features:

- Visits

- Site Usage

- Visitors Overview

- Map Overlay

- Content Overview

5
New cards

Whom Do You Want to Come to Your Website?

- Driving quality and qualified traffic to a website is a strategic process

- Characteristics of site demographic determine site design

- Create customer profile based on desired demographic

- Profile is a description of your customer based on various criteria (Age range, gender, marital status, geographical location, occupation, etc.)

6
New cards

Identifying the demographic for a website:

- Helps create a focus for the site based on visitor need

- Creates a design suited for a specific group

- Pinpoints characteristics of your ideal customer

- Identifies the geographical area with the highest number of ideal – customers

7
New cards

Accepting User Input on Your Website

- Websites may have interactive elements, designed to engage visitors so they return to the site

- Interactive elements may introduce security considerations, including phishing, bullying, and cyberstalking

- Corporate sites provide various forms of user input including forums, surveys, feedback forms, and email

- Input mechanisms are designed to increase interactivity and communication to visitors

8
New cards

Advantages of forums:

- Repeat visitors

- Increased keyword exposure

- Email address acquisition

- Opportunities to gather demographic data

- Support for online relationships

9
New cards

Disadvantages of forums:

- Requirement for technical expertise

- Requirement for content monitoring

- Need to police for bullying and stalking

- Risk of ad flooding

10
New cards

Website feedback forms:

- Contact Us forms

- Customer support forms

- Signup forms

11
New cards

Online surveys

- Provide a great way for visitors to communicate

- Gather information from the visitor

- Provide a method to interact with the site

- Should be brief and only require a few minutes to fill out

- Choose questions carefully to elicit information you are seeking

12
New cards

The Open Web Application Security Project (OWASP) Top 10 Threats

1. Broken access control

2. Cryptographic failures

3. Injection

4. Insecure design

5. Security misconfiguration

6. Vulnerable and outdated components

7. Identification and authentication failures

8. Software and data integrity failures

9. Security logging and monitoring failures

10. Server-Side Request Forgery (SSFR)

13
New cards

Broken access control:

Vulnerabilities created through the assumption that access control is an automatic feature of routers and firewalls or the misconfiguration of the settings and rules that control an implementation of access control

14
New cards

Broken Access Control Mitigation:

Principle of least privilege

15
New cards

Cryptographic failures:

Also known as a sensitive data exposure, removes all or part of the encryption protection that was to have protected sensitive data

16
New cards

Cryptographic failures Mitigation:

Inventory and classify data at rest and in transit, encrypt sensitive data at rest, use secure protocols, use authenticated encryption, use password-based key derivation function (PBKDF), ensure cryptographic randomness is based on high entropy or an unpredictable seed, avoid deprecated cryptographic functions and padding schemes

17
New cards

Injection

Injection flaws allow attackers to relay malicious code through the web application to another system; common attack is SQL injection

18
New cards

Injection Mitigation:

Principle of least privilege

19
New cards

Insecure design:

Omits or misapplies security measures

20
New cards

Insecure design Mitigation:

Understand organization’s threat and risk exposures and the vulnerabilities they are focused on

21
New cards

Security misconfigurations:

Failure of system administrator or security personnel to understand default configuration settings of hardware and software and the configuration changes needed to fit them into the existing system’s infrastructure and ensure secure operations

22
New cards

Security misconfigurations Mitigation:

Security audits, reviewing product life cycles, understanding the function and role of the system, training and research

23
New cards

Vulnerable and outdated components:

Lack of inventory, software outdated/unmanaged, no vulnerability scans, patches not applied, lack of testing

24
New cards

Vulnerable and outdated components Mitigation:

Harden systems, keep inventory current, track installed software versions and dependencies, implement patch management process, regularly review Common Vulnerability and Exposures (CVE) list and National Vulnerability Database, get email alerts for installed software, track hardware components near end of life

25
New cards

CVE

Common Vulnerability and Exposures

26
New cards

Identification and authentication failures

- Identification validates credentials against those on file

- Authentication uses submitted credentials and requests additional information to verify that the identified person can be authenticated and permitted to access the system

- Muti-factor authentication (MFA) requires a verifying element over and above the standard username and password credentials

27
New cards

Identification and authentication failures Mitigation:

Strong passwords, password rotation, encryption of password storage and transmission, session ID protection, caching and back button

28
New cards

Software and data integrity failures:

- Applications rely on plugins, libraries, or modules, many from untrusted sources, GitHub repositories, and content delivery networks (CDNs)

- An insecure continuous integration/continuous deployment (CI/CD) pipeline can introduce potential for unauthorized access, malicious code, or system compromise

29
New cards

Software and data integrity failures Mitigation:

- Use digital signatures to ensure the update or patch is downloaded from the expected source.

- Ensure libraries in digital repositories are secure.

- Verify that downloaded system components do not contain vulnerabilities.

- Implement review process of code and confirmation changes.

- Ensure unsigned or unencrypted data are not forwarded without clearing an integrity check or digital signature.

30
New cards

Security logging and monitoring failures

Logging omits auditable events:

- No warning or error messages produced

- Suspicious actions of application software and APIs not monitored

- Logs are not consolidated to a central authority

- Alert triggering thresholds and issue escalation processes are not implemented or are ineffective.

31
New cards

Security logging and monitoring failures mitigation:

- Ensure login, access control, and validation failures are logged

- Ensure log data are correctly identified

- Ensure high-value transactions are recorded in a log file and have integrity controls to prevent tampering or deletion.

- Ensure effective monitoring and notification procedures are defined and in place so that suspicious activities are quickly detected and alerted

32
New cards

SSRF:

Server-Side Request Forgery

33
New cards

Server-Side Request Forgery (SSRF):

When a webpage or application sends a request for a remote object (webpage, database, etc.) without considering whether the requested object or its URL are safe, attacker could alter requesting software to send an altered request to a malignant URL

34
New cards

Server-Side Request Forgery (SSRF) Mitigations

- Implement defense-in-depth (DiD) controls.

- Distribute remote resource access over two or more networks.

- Implement “denial by default” firewall rules and network access control policies that permit essential intranet traffic but block all other traffic.

- Log all permitted and denied firewall traffic.

- Validate all client-supplied input data.

- Disable HTTP redirections.

- Enforce URL consistency, using the same structure and syntax in all website URLs.

35
New cards

DiD:

defense-in-depth

36
New cards

Information leakage and improper error handling:

- Occurs when an attacker exploits the information in an unsecured error message

- Information included in error messages

- - Error tracing

- - Network and name information

- - Verification of the existence of a file

- - Database details

37
New cards

Unsecure communications

- Susceptible to data theft and other forms of tampering

- Mitigation: Internet Key Exchange (IKE), which manages the security association (SA) negotiation process for Internet Protocol Security (IPSec) connections

38
New cards

Failure to restrict URL access

When information on a web server is not sufficiently protected, user can find hidden URLs and sensitive data.

39
New cards

Failure to restrict URL access Mitigation:

Implement access control for each function.

- The web user must be authorized explicitly to operate that function.

- Removing risk of attacks requires careful planning.

- Web application developers need to plan from the design stage to implement protection throughout the application.

- Website administrators must perform penetration testing, which mimics an attacker.

40
New cards

Attack strategies:

- Authentication and authorization attacks

- Client-side attacks, including Cross-Site Scripting (XSS) and Cross-Site - - - Request Forgery (CSRF) attacks

- Command execution attacks (malicious execution and SQL injection attacks)

- Information disclosure attacks

41
New cards

Best practices to mitigate and manage attacks strategies

- General network security procedures

- Network security procedures

- Deploy encryption strategies

- User education

- Preventing mitigation tools

42
New cards

CSRF:

Request Forgery (CSRF) attacks