3.7 KiB
| title | aliases | tags | ||
|---|---|---|---|---|
| 8-application-security-1 |
|
application development security
- human error
- policy failure
- physical access
- network access
- social engineering
- software flaws
- third party
- created by you
10 immuntable laws of security
- If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore.
- If a bad guy can alter the operating system on your computer, it’s not your computer anymore.
- If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
- If you allow a bad guy to upload programs to your website, it’s not your website any more.
- Weak passwords trump strong security.
- A computer is only as secure as the administrator is trustworthy.
- Encrypted data is only as secure as the decryption key.
- An out of date virus scanner is only marginally better than no virus scanner at all.
- Absolute anonymity isn’t practical, in real life or on the Web.
- Technology is not a panacea.
Cost of data breach
about $150 per record. or 3.86 million per US company
Costs include:
- Notifying affected customers
- Hiring forensic experts
- Additional call centers
- Providing credit monitoring services to those affected
- Internal investigations
- Lost customers
- Lost reputation
- Public relations
The costs vary significantly from county to country:
- Differences in privacy related laws.
- Costs relating to notifying affected customers vary widely.
- Some countries have additional penalties for breaches involving medical records and data relating to minors.
- Some countries/regions experience more destructive attacks.
Other interesting points made in the report:
- Average time to to discover a breach was 207 days.
- Average time to contain a breach was 73 days.
- 80% of breaches exposed customer’s PII (Personally Identiable Information).
- A company has a ~30% chance of having a serious data breach within the next 2 years (based on 2019 report).
- The per-record cost increases with the number of records breached
CWE/SANS
CWE - Common Weakness Enumeration. A community developed list of software security flaw, and details on how to avoid them. SANS - (SysAdmin, Audit, Network, Security) Institute. A research and education institute for security practitioners. MITRE - A not-for-profit research organisation that works with the US government.
Top 25 errors
- Out-of-bounds Write **
- Cross-site Scripting (XSS) **
- Out-of-bounds Read **
- Improper Input Validation **
- OS Command Injection **
- SQL Injection **
- Use After Free **
- Path Traversal **
- Cross-Site Request Forgery (CSRF) **
- Unrestricted Upload **
- Missing Authentication *
- Integer Overflow
- Deserialization of Untrusted Data **
- Improper Authentication *
- NULL Pointer Dereference **
- Use of Hard-coded Credentials
- Buffer overflow **
- Missing Authorization *
- Incorrect Default Permissions *
- Exposure of Sensitive Information **
- Insufficiently Protected Credentials
- Incorrect Permission Assignment *
- Improper Restriction of XML External Entity Reference
- Server-Side Request Forgery
- Command Injection **
**. covered in this lecture *. Covered in other lectures
1 Injection 2 Broken Authentication 3 Sensitive Data Exposure 4 XML External Entities (XXE) 5 Broken Access Control 6 Security Misconfiguration 7 Cross-Site Scripting (XSS) 8 Insecure Deserialization 9 Using Components with Known Vulnerabilities 10 Insufficient Logging & Monitoring

