Web Application Security

Review the attached slides to summaries  week 1 of 2 and week 2 of 2

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

 The quantity and quality of new insights from your own independent research/experience

 Adherence to page limits, font, font-size, line spacing, and margins

 Use of at least 2 new references

 Reputation of the reference sources

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

 Use of in-text citations with matching references and vice-versa

 Appropriateness of the use of the APA format for both in-text citations and references.

Please see the attachment.

Research Notes – Instructions

Research Notes Requirements:

You will required to complete 5 self-study research notes in this course. Each research note will cover course materials from a 2-week period. All 5 research notes are due before midnight (11:59 p.m.) on their respective due dates (see Course Schedule or Calendar on Blackboard for due dates for each research note) on Blackboard (Please do not email me your research notes). The research notes are designed to help you review the course materials and to synthesize the course material with insights from your own research/experience.

Here are the requirements for each research note:

1. Page limits: Each research note must be 1 page (minimum) to 2 pages (maximum) long (Times New Roman, 12-pt font, single-line spacing, 1-inch margins)

2. Research note structure and recommended page lengths: Use the following structure and page lengths recommendations in the research note:

a) Summary of course materials from week 1 of 2 and week 2 of 2 – Summaries must be in paragraph format. Do not use a list with bullet points to summarize course materials. Summaries must be your own paraphrasing of the course materials. Do not copy and paste information from the slides or the articles linked to in the slides to create your summaries. There is no need to cite the PowerPoint slides. However, if you are using information from an article/video linked to in the slides, then you will need to cite it. Recommended minimum page length: ½ of a page.

b) Additional insights based on your own research/experience – Do some additional research online and present new insights related to the topics covered in both weeks. Present at least 2 new insights in this section. You should not copy and paste from online resources. You must give proper credit to the source. This means adding both in-text citations in your paragraphs and adding a reference section at the end of your research note. Use the APA citation format for both in-text citations and references. Recommended minimum page length: ½ of a page.

c) References – You must include at least 2 new references (not including the ones from the slides/videos posted on Blackboard) as a part of your research note. Please make sure that you cite reputed resources and avoid using resources such as Wikipedia as your reference source. If you are not sure of whether or not to use a resource as a reference, send me the information by email and I will let you know whether or not to use the resource as a reference. The references section must also be in APA format.

Grading Guidelines:

Each research note will be graded based on the following criteria:

 Completeness of your summaries from week 1 of 2 and week 2 of 2

 The quantity and quality of new insights from your own independent research/experience

 Adherence to page limits, font, font-size, line spacing, and margins

 Use of at least 2 new references

 Reputation of the reference sources

 Use of in-text citations with matching references and vice-versa

 Appropriateness of the use of the APA format for both in-text citations and references

Intro to Web Application Security

ITC 766-899

WEB APPLICATION SECURITY

Spring 2022

Dr. Ravi Thambusamy

Information Technology and Cybersecurity

College of Business

Missouri State University

1

Outline
What is WWW?
How is the WWW different from the Internet?
What is an application?
What is a web application?
Web application examples
What technologies are needed to make a web application work?
2

Outline
How does a web application work?
What is the need for web application security?
How is web application security different from network security?
What is the OWASP top ten list?
3

What is WWW?
4

WWW is an acronym for the World Wide Web
It was created by Tim Berners-Lee
It is a collection of web pages using hypertext
It can be accessed from a computer, smartphone, and even an automobile
It is not the same as the Internet
Technologies needed: web server, browser, domain naming system, website address, HTTP, HTML, CSS, JavaScript, etc.
What is WWW? (contd.)
5

What is the world wide web? – Twila Camp
What is WWW? (contd.)
Source: TED-Ed

6

A brief history of the WWW by CERN
What is WWW? (contd.)
Source: CERN

7

How is WWW different from the Internet?
8

WWW is a collection of web pages
The Internet is a network of networks
The Internet allows access to the web
However, the web is just a subset of traffic that can go back and forth on the Internet
Other types of traffic on the Internet include email (SMTP), file transfer (FTP, P2P, etc.), network management (SNMP, DHCP, etc.)
How is WWW different from the Internet?
9

What is an Application?
10

An application is a type of software that is designed to execute particular tasks based on events triggered by end user interactions with the application
It is typically an executable
It is not the same as operating system software
It is also not the same as hardware
An application can be a standalone application, a web store app, a web application, or a web service
What is an Application?
11

What is a Web Application?
12

A web application is an application that is hosted on a web server and can be accessed by a client using a browser
It utilizes the client–server architecture
It is non-native and does not need to be installed on the client’s computer
It will need an active Internet connection to run
It is not the same as a static webpage
It must be interactive to the end user
What is a Web Application?
13

Web Application Examples
14

Web application examples include the following:
Web search engines (example: Google, Yahoo!, etc.)
Online marketplaces (example: Amazon, eBay, etc.)
Online social networks (example: Twitter, Instagram, etc.)
Online banking (example: Bank of America, Chase, etc.)
Online utilities (example: Google Maps, FlightAware, etc.)
Web Application Examples
15

Web application examples include the following:
Online news sites (example: nbcnews.com, abcnews.go.com, etc.)
Online weather sites (example: weather.com, accuweather.com, etc.)
Online tax services (example: TurboTax, TaxSlayer, etc.)
Online fundraising sites (example: GoFundMe, FUNDLY, etc.)
Online document management sites (example: Google G Suite, Microsoft Office 365
Web Application Examples (contd.)
16

Web Application Technologies
17

Technologies needed to deploy web applications:
Web server that hosts the web application
Browser installed on the client’s device that requests the web application
Internet to connect the client to the server and to transfer data back and forth between the two
Website address to type in as a Uniform Resource Location (URL) on the browser to access the web application
Web Application Technologies
18

Technologies needed:
Domain Name System (DNS) servers which translate the website address (URL) to an Internet Protocol (IP) address and vice versa
HyperText Transfer Protocol (HTTP) that specifies the communication language for sending and receiving data between the client and the server
Code files written using HTML, CSS, JavaScript, Java, C#, AJAX, etc. that execute the business logic portion of the web application
Web Application Technologies (contd.)
19

How does a Web Application Work?
20

How does a Web Application Work?
21

Client types in web application URL into the browser

The browser looks up the web application’s IP address using the DNS

The browser then uses this IP address to send an HTTP request message to the web server which hosts the web application

This HTTP request message is sent to the web server using the client’s Internet connection

The web server receives the HTTP request made by the client

The web server then authenticates the client based on the client-supplied credentials

The web server then sends an HTTP response header with the response code 200 for a successful request along with the response body in the form of packets back to the client using the Internet

On successful authentication, the web server authorizes the client’s access to the requested web application

The browser parses the information sent from the web server and uses HTML/CSS/JavaScript, etc. to assemble and display the web application to the client

What is the need for Web Application Security?
22

Executive Summary from the Verizon 2021 Data Breach Investigations Report (DBIR)
Web application security is a growing concern among organizations (Verizon DBIR, 2021)
Web application attacks were among the top 3 patterns in the following industries (Verizon DBIR, 2021)
Accommodation & Food Services, Arts, Entertainment & Recreation, Financial & Insurance, Healthcare, Information, Manufacturing, Mining, Quarrying, Oil & Gas Extraction + Utilities, Professional, Scientific & Technical Services, and Retail
What is the need for Web Application Security?
23

Source: Verizon 2021 Data Breach Investigations Report (DBIR) https://enterprise.verizon.com/resources/reports/dbir/2021/results-and-analysis/
What is the need for Web Application Security? (contd.)
Web application leads the top hacking action vectors (Verizon DBIR, 2021):

24

What is the need for Web Application Security? (contd.)
Source: Verizon 2019 Data Breach Investigations Report (DBIR) https://www.verizon.com/business/resources/executivebriefs/2019-dbir-executive-brief

Web application incidents and breaches by industry (Verizon DBIR, 2019):
25

Web Application Security vs. Network Security
26

Web Application Security vs. Network Security
Source: 2021 Gartner Forecasts Worldwide Security and Risk Management Spending to Exceed $150 Billion in 2021 https://www.gartner.com/en/newsroom/press-releases/2021-05-17-gartner-forecasts-worldwide-security-and-risk-managem
27

Web Application Security Network Security
Focuses on vulnerabilities in web applications Focuses on vulnerabilities in infrastructure (servers, clients, routers, switches, firewalls, intrusion detection/prevention systems
Focuses on the Application Layer in the 7-layer Open Systems Interconnected (OSI) model Focuses on the Transport, Network, Data Link, and Physical Layers in the 7-layer OSI model
Web application security issues are identified using the Common Weakness Enumeration (CWE) list Network security issues are identified using the Common Vulnerabilities and Exposures (CVE) list
The total number of weaknesses in the CWE List version 4.6 is 924 (Mitre, 2022) The total number of vulnerabilities in the current CVE List is 168,222 (Mitre, 2020)
Organizations are not focusing enough on this Focus of most organizations

Web Application Security vs. Network Security (contd.)
28

The OWASP Top 10 List
29

OWASP is an acronym for Open Web Application Security Project
OWASP is “an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted” (About the OWASP Foundation, para 2, 2022)
Non-profit organization incorporated in 2004
The OWASP Top 10 List
30

The OWASP Top 10 is “a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications” (OWASP Top 10, para 1, 2022)
Serves as a starting point for organizations seeking to mitigate the risks associated with their web applications
The OWASP Top 10 List (contd.)
31

The OWASP Top 10 Web Application Security Risks (2017 Version):
The OWASP Top 10 List (contd.)
1. Injection
2. Broken Authentication
3. Sensitive Data Exposure
4. XML External Entities (XXE)
5. Broken Access Control
6. Security Misconfiguration
7. Cross-Site Scripting (XSS)
8. Insecure Deserialization
9. Using Components with Known Vulnerabilities
10. Insufficient Logging & Monitoring
Source: 2017 Top 10 – OWASP
https://owasp.org/www-project-top-ten/2017/Top_10.html
32

The OWASP Top 10 Web Application Security Risks (2017 to 2021 Mapping):
The OWASP Top 10 List (contd.)
Source: OWASP Top 10
https://owasp.org/www-project-top-ten/
33

WWW is not the same as the Internet
Web applications are here to stay
Web application technologies are not without flaws
The Verizon 2021 DBIR highlights the need for web application security
Web application security is different from network security
The OWASP Top 10 List is a good starting point for organizations looking to secure their web applications
Recap
34

Thank you!!!
35

Web Application Technologies
– An In-Depth Look

ITC 766-899

WEB APPLICATION SECURITY

Spring 2022

Dr. Ravi Thambusamy

Information Technology and Cybersecurity

College of Business

Missouri State University

1

Outline
Web Application Server
Client Machine
Browser
Internet
Website Address / Uniform Resource Locator (URL)
2

Outline (contd.)
Domain Name System (DNS) Servers
HyperText Transfer Protocol (HTTP)
HyperText Markup Language (HTML)
Cascading Style Sheets (CSS)
JavaScript
Java / .NET / C# / Python, etc.
3

Web Application Server
4

Serves as the host for web applications
Refers to the “server” portion of the client-server architecture
Receives the HyperText Transfer Protocol (HTTP) request message from the client machine’s browser
Authenticates the client based on the user-supplied credentials
Examples: Apache Tomcat, Microsoft IIS, IBM WebSphere, Oracle WebLogic, Red Hat JBoss EAP, etc.
Web Application Server
5

Authorizes the client’s access to the requested web application after authentication
Sends an HTTP response header back to the client machine with the response code 200 for successful requests or the response code 404 for page not found (maybe due to a broken link)
Uses ports to make services available to clients
Common port numbers: 80 for HTTP traffic, 25 for SMTP traffic, 21 for FTP traffic, 23 for telnet traffic, etc.
Web Application Server (contd.)
6

Traditional three-tier web hosting architecture
Web Application Server (contd.)
Source: 2021 Amazon Web Services: Web Application Hosting in the AWS Cloud –
https://d1.awsstatic.com/whitepapers/aws-web-hosting-best-practices
7

Client Machine
8

Refers to the “client” portion of the client-server architecture
Is an Internet-connected device that allows a user to not only request services from a server, but also to view the results returned by the server
Is typically a workstation (at work) or a personal computer (at home)
Client Machine
9

Runs on a specific operating system (Microsoft Windows 10 Version 21H1, Apple macOS 12.0 Monterey, Google Android OS 12.0, Apple iOS 15.3, Linux Mint 20.3)
Has a browser (Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Edge, etc.) installed on it
Client Machine (contd.)
10

Browser
11

Is installed on the client machine
Is used to request the web application from the web application server
Accepts website address in the form of a Uniform Resource Locator (URL)
Sends the URL to a Domain Name System (DNS) server to translate the URL into an Internet Protocol (IP) address
Browser
12

Uses the IP address received from the DNS server to send an HTTP request message to the web application server
Parses the information sent back from the web application server
Assembles and displays the web application to the end user on the client machine by converting HTML/CSS/JavaScript code into text, images, and videos
Browser (contd.)
13

Browser (contd.)
Source: OpenCanvas –

How Web Browsers Function? – OpenCanvas

14

Internet
15

Is a network of networks (infrastructure)
Is needed to connect the client to the server in the client-server architecture
Allows access to the web using HTTP
Also allows other traffic (SMTP, FTP, SNMP, DHCP, etc.)
Is provided by an Internet Service Provider (ISP) for a fee
Internet
16

Website Address / Uniform Resource Locator
17

Is made up of protocols, host names, domain names, top level domain, port numbers, file paths, file names, parameter strings, and anchors
Is maintained by a registrar (example: GoDaddy.com, Wix.com, etc.)
Lets clients access a web application using the name of the organization (amazon.com) that owns it instead of having to remember an IP address (204.246.162.5)

Website Address / Uniform Resource Locator
18

Website Address / URL (contd.)
Source: GCFLearnFree.org –

Internet Tips: Understanding URLs – GCFLearnFree.org

19

Domain Name System (DNS) Servers
20

Is a protocol that operates on layer 7 (Application Layer) in the 7-layer Open Systems Interconnection (OSI) model
Resolves a given website address or URL (example: amazon.com) into its corresponding IP address (example: 204.246.162.5)
Is made up of resolvers, root servers, Top Level Domain (TLD) servers, and authoritative name servers
Domain Name System (DNS) Servers
21

DNS Servers (contd.)
Source: PowerCert Animated Videos – https://www.youtube.com/watch?v=mpQZVYPuDGU
How a DNS Server works? – PowerCert
22

HyperText Transfer Protocol (HTTP)
23

HyperText Transfer Protocol (HTTP)
Is another protocol that operates on layer 7 (Application Layer) in the 7-layer Open Systems Interconnection (OSI) model
Specifies the communication language for sending and receiving data between the client and the server in a client-server architecture
An overview of HTTP – MDN (source: Mozilla MDN web docs, 2021)
24

HyperText Transfer Protocol (HTTP) (contd.)
Source: Code.org – https://www.youtube.com/watch?v=kBXQZMmiA4s
The Internet: HTTP & HTML – Code.org

25

HyperText Markup Language (HTML)
26

Instructs the browser to assemble and display the web application to the end user
Is the code that describes the structure and content of a web application
Uses start tags (<>) and end tags () to represent different components of a web application such as head, title, body, paragraph, table, form, etc.
HTML Tutorial (Source: w3schools.com)
HyperText Markup Language (HTML)
27

Cascading Style Sheets (CSS)
28

Cascading Style Sheets (CSS)
CSS is a language that specifies how HTML components such as head, title, body, paragraph, table, form, etc. are displayed on a browser
amazon.com with CSS and without CSS
HTML has basic formatting tags
CSS allows a lot more flexibility in terms of how web applications appear
CSS Tutorial (Source: w3schools.com)
29

Cascading Style Sheets (CSS) (contd.)
CSS Basics (Part 1) – What is CSS? – DevTips
Source: DevTips – https://www.youtube.com/watch?v=s7ONvIgOWdM
30

JavaScript
31

Allows web applications to be interactive
Is the code required to handle user-triggered events (behavior)
Is not the same as Java since it is a client-side scripting language (runs inside a browser)
Is placed inside of HTML code using the tags
JavaScript Tutorial (Source: w3schools.com)
Utilizes other concepts such as JSON, DOM, AJAX, etc. (Source: w3schools.com)
JavaScript
32

Java / .NET / C# / Python, etc.
33

Java / .NET / C# / Python
Used as a part of the application tier in the 3-tier web application architecture to code the business logic behind the web applications
Are all examples of Object-Oriented Programming (OOP) languages which emphasize encapsulation, inheritance, and polymorphism
Java / .NET / C# / Python, etc.
34

Web applications require several different technologies to come together in order to work
These include:
Web application servers, client machines, browsers, Internet, website address/URL, DNS servers, HTTP, HTML, CSS, JavaScript, Java/.NET/C#/Python, etc.
Before we can comprehend what vulnerabilities exist in web applications and how to fix those, we need to gain a better understanding of the technologies that enable a web application to work
Recap
35

Thank you!!!
36

Order a unique copy of this paper

600 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal

Order your essay today and save 25% with the discount code GREEN