2.1 Application Security
2.1 Application Security
UNIT 2
Application Security
• Application security is the use of software,
hardware, and procedural methods to protect
applications from external threats.
• It has become necessary to secure the applications
evolved or used by the organization.
• Attackers in the last decades, not only targeted
the servers and operation systems but also
attacked the client applications
• Security professionals are aware that
applications, especially client side, third party
applications must be secured
Application Security contd…
• The internet is a highly vulnerable place; any
application interacting with the web is always
under threat.
• Attackers try to take advantage of any
vulnerability through which they can affect
the normal operations of a user.
• Most OS Vendors used patched systems to
keep vulnerability to minimum but even the
patched systems are devoid of attacks.
Application security
• Attackers targets-
– Servers
– Operating Systems
– Client-side Applications(Browsers, Multimedia,
Document Readers)
– Third Party Applications
Challenges in Application Security
• Verification of users: Needs to verify that only
genuine users are trying to use them.
• Authorization: The application needs to
determine if the identified user is allowed to
access the requested functionality.
• Encryption of data: Data stored by applications
needs to be safeguarded from potential attacks.
• Data Integrity and non-repudiation: Neither the
sender nor the receiver should be able to deny
the authenticity of the message.
Challenges in Application Security
• Safeguarding applications from the attacks:
• Guarding privacy of applications:
i) Information generated from the applications and
how it is used, distributed, shared or dispensed
with third parties.
ii) How application services themselves expose the
personal information of the users.
iii)Various laws have been framed regarding data
privacy.
Application security threats
Integrity:
Threats Consequences Countermeasures
Modification of user Loss of Cryptographic
data information checksums
Trojan horse browser Compromise of
Modification of machine
memory Vulnerability to
Modification of all other
message traffic in threats
transit
Vendors Challenges for Application
Security
• Biggest challenges for software vendors is the
availability of various OS platform and
different versions of software applications
• Compatibility-Already existing platforms have
their own security considerations
• Some applications are browser specific
• Development related issues
Users Challenges for Application
Security
UNIT 2
Viruses
• A virus refers to piece of software that is
designed and developed with purpose of
infecting a computer system and performs
illegal operations.
• A virus infected system can hamper data
stored on a drive, crash the OS.
• Virus can attack via infected media like CD,
USB drives, internet, etc
Virus categories
• Trojan horse
– It is transmitted to a system under disguise (mask) of any
legitimate (genuine) application or program. Like
attachment to a program or as a part of installation
process.
• Logic bombs -A logic bomb is a piece of code inserted
into an operating system or software application that
implements a malicious function after a certain amount of
time, or specific conditions are met. Logic bombs are often
used with viruses, worms, and trojan horses to time them to
do maximum damage before being noticed.
– Code executed when a pre-defined event occurs.
• Worms - It is self-sufficient to replicate themselves. It
target to RAM.
Worms - It is self-sufficient to replicate
themselves. It target to RAM.
• A computer worm is a standalone malware
computer program that replicates itself in
order to spread to other computers. Often, it
uses a computer network to spread itself,
relying on security failures on the target
computer to access it. Unlike a computer
virus, it does not need to attach itself to an
existing program.
Antivirus Software
Antivirus software is designed to detect, prevent, and remove
malicious software.
• Norton
• McAfee
• Kaspersky
• Avast
• Quick heal
• AVG
Spoofing
• Spoofing means to provide false information
about your identity to gain unauthorized access
of other computers. Types of Spoofing
• IP spoofing
– Connection hijacking through a fake IP address.
• Content spoofing
– Ask your personal information
• Caller ID spoofing the actual originating station.
– Caller ID display which is not actual.
• Email spoofing
– Originating from someone
IP Spoofing
Definition:
Attacker uses IP address of another computer to acquire
information or gain access