290 likes | 409 Views
Maintaining & Reviewing a Web Application’s Security. By: Karen Baldacchino Date: 15 September 2012. Agenda:. The Project Areas of Study Selecting the Right Resources Ideas for Further Studies. Agenda:. The Project Areas of Study Selecting the Right Resources
E N D
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15September2012
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
The Project • Title: Auditing the Security of E-banking Applications: • An Analysis of the Standards, Guidelines and Best PractisesAvailable • Objective: To highlight the mostusefulresourcesavailable to the information security manager and the information securityauditor in securing and reviewing the security of web applications.
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
Areas of Study Information Security Governance Information Security Policies & User Awareness Security Incident Management Communication Channel Security Logical Access Controls Change Management Systems Development Systems Backup & RecoveryProcedures Management of User Authentication Web-Application Specific Security Measures Monitoring of System Security Security Reviews and PenetrationTesting CompliancewithLaws, Regulations & Applicable Standards Outsourcing
Areas of Study Information Security Governance Information Security Policies & User Awareness Security Incident Management Communication Channel Security Logical Access Controls Change Management Systems Development Systems Backup & RecoveryProcedures Management of User Authentication Web-Application Specific Security Measures Monitoring of System Security Security Reviews and PenetrationTesting CompliancewithLaws, Regulations & Applicable Standards Outsourcing
Communication Channel Security Risks WEB STRIDE Attacks -- Tampering and Eavesdropping Message mis-routing or re-routing Message interception Covert channels
Communication Channel Security Controls Use of MAC, HMAC and Digital Signatures Use of public key certificate Adequate service levels from network service provider Use of SSL or IPSec Close unnecessary ports Disable unused protocols Use secure flag on cookies Harden the TCP/IP Stack
Monitoring of System Security Risks • Mis-use or compromise of security audit tools • Insufficient notifications and alerts • Failure to identifysuspicious transactions • Failure to respond to alerts • Use of keyloggers, form-grabbers and spyware • Scanning, foot-printing and fingerprinting
Monitoring of System Security Controls • Intrustiondetection and Intrusion preventionsystems • Security incident handling • Alerting on unauthorizedactivities • Alerting on unusualactivities • Use of network monitoring tools • Deploy software patches and anti-virus definitions in a timelymanner
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
FurtherStudyIdeas • Focus the study on other web-application types, eg: e-shopping, social networking etc. • Focus the study on mobile-banking applications • Focus the study on cloud-based applications • Apply the same methodology for supporting other areas such as Enterprise-wide Security Risk Management
Thankyou for Listening Any Questions? Contact Information: Karen Baldacchino Email: karen.baldacchino@gmail.com Tel: +356 2563 1263 Mob: +356 7904 6528 Skype:karenbaldacchino