Chapter 5 : Application Security Flashcards
Securing Web Browsers
- Avoid newest versions and disable auto update (new versions are unstable)
- Consider organizational requirements and OS
- General Browser Security Procedures
> Implement Policies
Hand written, browser settings, GPO(Windows), OS setting etc
> Train Users
> Use proxy and content filter
Proxy serves as an intermediate cache between server and client
Configured in browser settings / domain controller
Beware of malicious proxy configurations
> Secure against malicious code
Configure Java, ActiveX, Javascript, Flash media etc
- Web Browser Concerns and Security Methods
Basic Methods > Timely Updates > Adblock, pop up blocking > Implement security zones > Control ActiveX/Java/Plugins > Avoid jailbreaking (mobile)
How can you secure Cookies?
> Configure and control through browser settings
> Related threat : Session Hijacking
Securing LSO(Locally Shared Objects - Flash)
> Flash version of cookies, may be used to track users
> Configure and control in Flash Player Settings Manager
Securing Addons / Plugins
> Inherent security risk, disable all
> Most IE plugins made with vulnerable ActiveX
Advanced Browser Security
> Browser temp files – configure to automatically flush
> Disable saved passwords
> Configure a minimum version limit on TLS/SSL
> Disable all 3rd party plugins
> Consider using a VPN or virtual machine for extra separation
Principle of Least Functionality
don’t give tools users don’t need
User Account Control (Windows)
- Keeps everyone on regular user level of access by default
- Prompts required to access any admin right required things
Securing common Windows programs 1. Outlook
> Install latest update, upgrade to newer version of Office
> Use email whitelisting to remove junk email
> Read email in text format instead of HTML
> Enable attachment blocking
> Use encryption - SPA (Secure Password Authentication), PGP, SSL
Securing common Windows programs 2. Word
> Using passwords for opening/modifying documents
> Read only settings
> Digital certificates
Securing common Windows programs 3. Excel
> Password protected worksheets, no macro
> Excel encryption
Mobile Applications
- Disable GPS
- Configure strong passwords
Server Applications - e.g. FTP, Email, Web, SQL database
- Change default username / passwords
- Don’t consolidate multiple services into single machine
SDLC
(Software Development Life Cycle)
SDLC- Waterfall
> Traditional method
> Requirements are decided before development