Web Security (CAT-309) - Unit 1 Lecture 2
Web Security (CAT-309) - Unit 1 Lecture 2
COMPUTING
Bachelor of Computer Application
Subject Name: Web Security
Code:CAT-309
Reference:
http://iso27001guide.com/annex-a/information-security-business-continuity/information-security-continuity/informa
tion-security-continuity-mean-iso-27001 4
/ [3]
TERMS
• Security Policies
• Password policy
• Network login policy
• User Policies
• IT Policies
• General Policies
• Remote access policy
• Security Attacks
• Security mechanisms
5
Threat, Attack, Vulnerabilities
• A threat is any potential occurrence, malicious or otherwise, that could
harm an asset. In other words, a threat is any bad thing that can happen
to your assets.
• A vulnerability is a weakness that makes a threat possible. This may
be because of poor design, configuration mistakes, or inappropriate
and insecure coding techniques.
• An attack is an action that exploits a vulnerability or enacts a threat.
Examples of attacks include sending malicious input to an application
or flooding a network in an attempt to deny service.
7
Web Application Vulnerabilities
Reference: Dafydd Stuttard, “The Web Application Hacker’s Handbook”, Wiley India Pvt. Ltd. [1]
Web security checklist
• Web application firewalls
• Information gathering
• Authorization
• Cryptography
• Resilience against attack
9
References
Reference websites:
1. https://blog.stackpath.com/web-application
2. https://www.altexsoft.com/blog/engineering/web-application-architecture-how-the-web-works/
3. http://iso27001guide.com/annex-a/information-security-business-continuity/information-securit
y-continuity/information-security-continuity-mean-iso-27001/
4. https://blog.stackpath.com/web-application
5. https://www.bizzsecure.com/design-information-security-policies-the-right-way/
10
THANK YOU
For queries
Email: piyush.e8970@cumail.in