Avoiding Security Risks of Web Applications

Source: Internet
Author: User
Keywords web application web application security web application security tutorial
At present, many new applications developed by enterprises are Web applications, and Web services are more and more frequently used to integrate or interact with Web applications. The problems brought by these trends are: Web applications and services Growth has gone beyond the scope of security training and security awareness that program developers receive.

With the rapid increase in the number of web applications with security risks, the Open Web Application Security Project (OWASP) has summarized the top ten common security vulnerabilities in existing web applications. Remind the enterprise and its program developers to avoid the security risks they bring to the enterprise IT system:

   Unvalidated Input

   It is a common programming loophole to ignore the verification of the validity of the data before it is input into the program. Following OWASP's investigation of the vulnerability of web applications, the problem of illegal input has become a common phenomenon in most web application security vulnerabilities.

  Broken Access Control Broken Access Control

  Most companies are very concerned about controlling established connections. However, allowing a specific string to be entered can allow attacks to bypass the company's control.

  Invalid account and thread management Broken Authentication and Session Management

   Good access control does not mean that everything is going well. The company should also protect the user’s password, session token, account list, and any other content that can provide attackers with beneficial information and help them attack the corporate network.

  Cross Site Scripting Flaws

This is a common attack. When the attack script is embedded in the corporate Web page or other accessible Web resources, the script will be activated when an unprotected desktop computer accesses this page or resource. This attack can affect The terminal computers of hundreds of employees in the enterprise.

  Buffer Overflows Buffer Overflows

   This problem generally occurs in programs written in earlier programming languages, such as C language. In fact, this programming error is actually caused by not determining the location of the input content in the memory.

  Injection attack Injection Flaws

   If the input content with grammatical meaning is not successfully blocked, it may lead to illegal access to the database information. The content entered in the Web form should be kept simple and should not contain executable code.

  Exception Error Handling Improper Error Handling

   When an error occurs, it is normal to submit an error message to the user, but if the submitted error message contains too much content, it is possible that the attacker may analyze the structure or configuration of the network environment.

  Insecure Storage Insecure Storage

For web applications, it is very important to properly store passwords, user names, and other information related to identity verification. Encrypting these information is a very effective way, but some companies will use those that have not been verified by practice. Encryption solutions may have security vulnerabilities.

  Program Denial of Service Attack Application Denial of Service

   Similar to a denial of service attack (DoS), an application's DoS attack will use a large number of illegal users to preempt application resources, causing legitimate users to be unable to use the web application.

  Insecure Configuration Management Insecure Configuration Management

   An effective configuration management process can provide good protection for Web applications and enterprise network architecture.

   The above ten vulnerabilities do not cover all the vulnerabilities in today's enterprise Web applications. They are only the most common problems encountered by OWASP members. It is also the content that all enterprises should focus on when developing and improving Web applications.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.