Chapter 4 Application and OS Security
Chapter 4 Application and OS Security
1
Application Security
The process of protecting software applications from a
modification of data.
2
Application Security
Applying application security throughout the software development
development.
4
Application Security Attack
Application Security Attack is a type of cyber attack
5
Application Security attack …
The following are some application security attack:
Outdated software
This can cause the data to spill over into adjacent memory
locations, potentially overwriting other critical data causing
the program to behave unpredictably or crash.
E.g. C, C++
8
Application Security attack
Solution for Buffer overflow
a. Address space randomization (ASR)-randomly
moves around the address space locations of data
regions.
b. Data execution prevention:-flags certain areas of
memory as non-executable or executable, which stops
an attack from running code in a non-executable region.
c. Input validation
Protection mechanisms
Implement secure coding practices, such as input
validation and error handling, to handle
unexpected inputs.
Use specialized tools, such as fuzzing frameworks and
security scanners, to test the security and robustness
of the applications and systems before deployed
10
in
Application Security attack
5. Cross-site scripting attacks(XSS) : occur when an
attacker is able to inject malicious code, in the form of a
script, into a web page that is then executed by the user's
browser.
Protection
Software developers must validate user input and encode
12
output.
Application Security attack
6. SQL injection attacks : are a type of cyber attack that
target web applications that use SQL databases.
14
Application Security attack
7. Hijacking is a type of network attack in which the
attacker takes over control and communication between the
victim system and the network.
Prevention
Encrypting all data transmitted on a web page.
15
Using HTTPS certification on websites.
Types of Application Security
Authentication, authorization, encryption, logging,
and application security testing are all examples of
application security features.
Traffic containing sensitive data that flows between end-user and cloud
in cloud-based applications can be encrypted to keep the data safe.
Logging :-it can assist in determining who gained access to the data and
how they did.
Application log files keep track of which parts of the application have
been accessed and by whom. 17
Tools for Application Security
A complete application security approach used for detection,
remediation and resolution of a variety of application
vulnerabilities and security challenges.
code is created.
24
OS Security
The process of protecting the underlying software and hardware that
runs a computer or other digital device.
29
Mobile security the protection of mobile devices,
such as smartphones and tablets, from unauthorized
access, theft, malware, and other security threats.
Mobile devices can be attacked by potentially
malicious apps, network-level attacks, and exploitation
of vulnerabilities within the devices and mobile OS.
Protection
Keep your software updated
Install a firewall.
Download apps from official app stores.
Always read the end-user agreement 30
Web security: the practice of protecting websites and
web applications from various types of cybersecurity
threats, such as hacking, data breaches, and
malware.
Websites and web applications often handle sensitive
information, such as user passwords and financial
data, and a security breach can have serious
consequences for both users and businesses.
Protection: browser policies, session mgmt, user
authentication
HTTPS 31
Network security: the practice of protecting computer
networks from various types of cybersecurity threats,
such as unauthorized access, data breaches, and
malware.
Network security is important because computer
networks often handle sensitive information, such as
personal data, financial information, and
intellectual property, and a security breach can have
serious consequences for both individuals and
organizations.
Protection:
32
Risk
management
It is the process of identifying, assessing, and
controlling risks that may impact an organization's
operations, projects, or assets.
It involves developing strategies and techniques to
mitigate risks and minimize their potential impact on
the organization.
It is an essential component of business planning and
decision-making, and it helps organizations to protect
their assets, reduce losses, and improve their overall
resilience.
Risk management process involves the33
Risk
management…
2. Risk assessment: assessing the likelihood and
potential impact of each identified risk, and prioritizing
them based on their level of risk.
3. Risk mitigation: developing strategies and
techniques to mitigate the potential impact of identified
risks, such as implementing control measures,
transferring risk to an insurance provider, or
avoiding the risk altogether.
4. Risk monitoring and review: monitoring the
effectiveness of the risk management strategies and
reviewing the risk management plan on a regular basis
34
Risk
management…
Four main risk management strategies, or risk
treatment options:
1. Risk Avoidance: avoiding the activity or situation that
poses the risk, either by not engaging in the activity or
by changing the approach to eliminate the risk
altogether.
2. Risk Reduction: taking steps to reduce the likelihood or
impact of the risk.
By implementing controls or safeguards, such as security
measures to minimize the chances of the risk occurring
or lessen its impact.
3. Risk Transfer: transferring the risk to another party,
35
Risk management
frameworks
Are set of processes, policies, and procedures that
are used to identify, assess, and manage risks in an
organization.
The goal of a risk management framework is to
minimize the impact of potential risks on an
organization's operations, assets, and reputation.
It includes risk identification, risk measurement
and assessment, risk mitigation, risk reporting
and monitoring, and risk governance.
36
Security System assessment and
evaluation
Security System assessment is the process of
evaluating the security of a system or application to
identify vulnerabilities and weaknesses that could be
exploited by attackers.
40
End of Chapter Four
Questions
! !!
OU
Y
N K
A
TH
41