123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> General >> View Article

Detection & Handling Of Application Security Threats

Profile Picture
By Author: AkanshaK
Total Articles: 6
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Since there are several variations in specific attacks as well as attack techniques, for better detection, it is essential to view the threat in the prospects of how attackers are attempting to achieve.

Application Threats & Countermeasures
A good way of detecting application threats is to arrange them in a vulnerable category. Here is an overview of the various categories and the main threats to the application.

Input validation vulnerability category includes threats like cross-site scripting, buffer overflow, SQL injection, and canonicalization.
Authentication is prone to brute force attacks, cookie replay, dictionary attacks and network eavesdropping.

Authorization includes confidential data disclosure, elevation of privilege, luring attacks and data tampering.

The configuration management category includes the attacks like unauthorized administration interface access, the absence of individual accountability, clear text config data retrieval, over-privileged process and unauthorized configuration stores access.

Sensitive data includes access to sensitive data in storage, ...
... data tampering, and network eavesdropping.

Session management includes session replay, session hijacking, and man in the middle attack.

Cryptography includes poor key management, poor key generation, custom or weak encryption.

Exception Management comprises a denial of service and information disclosure.

Auditing & Logging involves user denies of doing an action, attackers covers his tracks and attacker exploits a vulnerability without a trace.

How To Handle Application Security Threats
Validated Input- Validate the inputs to the application by using fundamental edit checking to ensure that the content submitted through the user interface is proper for each fold.

Bind Variables – take the benefits of bind variables when executing SQL queries.

Restrict the access to the internal resources through various application server config settings.

Update framework on a normal interval.

Qualify entire user input

Filter potentially malicious input

Choose a strong password, which is complex, aren’t regular words, and include a compilation of lowercase, uppercase, numeric & special characters.

Use standard encryption technology to keep sensitive information in configuration databases and files.

Use sturdy ACLs to safeguard Windows resources.

Perform role evaluation before permitting access to the application, which could potentially disclose sensitive data.

Use sturdy authorization with several gatekeepers.

Total Views: 522Word Count: 328See All articles From Author

Add Comment

General Articles

1. Ivf Centre In Shivajinagar | Onp Hospital
Author: Prisha Patil

2. Seo Tips For Startups: Improve Your Online Presence On A Budget
Author: Anitha Ray

3. Respite Care: Supporting Caregivers With Temporary Relief
Author: Stephen William

4. Best Multispecialty Hospital In Pune- Onp Prime Hospital
Author: Prisha Patil

5. How To Maximise Your Value When Paying The Average Price For Driving Lessons
Author: Michael Ware

6. White Label Cryptocurrency Exchange Software: The Future Of Trading Platforms
Author: Franklin wilson

7. Oferta Especial De Bet365 Clone Script – Plataforma De Apostas Rápida E Acessível
Author: haroldruffes

8. Entre No Mercado De Apostas Esportivas Com O 1xbet Clone Script, Com Lançamento Rápido E Custo Baixo
Author: haroldruffes

9. What To Expect From Your First Lesson With Manchester’s Best Driving Instructors
Author: Michael Ware

10. How Intensive Driving Courses Help You Pass The Driving Test Faster In Manchester
Author: Michael Ware

11. How To Prepare For A Week-long Intensive Driving Course In Manchester
Author: Michael Ware

12. How One Tool Simplified My Trading Journey Completely: The Smart Order Routing
Author: daviddunn

13. Demand For Plaque Psoriasis Market Will Grow At Highest Pace Owing To Rising Prevalence Rate Of Psoriasis Disease
Author: Ravina Pandya

14. Improve Your Jewelry Brand’s Online Presence With Listany’s Ecommerce Platform
Author: Listany

15. Mobelgrace: Finest Interior Furniture, Luxury Brands, And Bespoke Creations In Delhi Ncr
Author: Prince

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: