QAI eLearning Logo  
QAI elearning - A Division of QAI
QAI logo
 
  Home About Us Products and Solutions Organizations FAQs Contact Us  
Home > Security Testing for Web Applications
Security Testing for Web Applications
 
   
 
   
 
   

Security is a very critical aspect of Web Applications, keeping in mind the alarming rise in cyber crimes and intrusion attempts by malicious users. The financial losses and legal consequences that organizations can face due to security incidents are immense. This paper addresses some of the common maladies faced by QA Personnel and Customers from a Security Perspective. It describes the common Security vulnerabilities in applications with examples and techniques for testing the application for those vulnerabilities. Modelling techniques are discussed that help in identifying vulnerabilities and evaluate the Security Risks for an application. The paper suggests Processes, Framework, and Tools to help in providing highly effective and low cost Security Testing Solutions (specifically Penetration Testing) for Web Applications. Embedded in the paper are Traceability Templates, a Test Plan Template, a Checklist and a Process flow for Security Testing. The objective is to enable detection of Security loopholes in applications at an early stage, to help in protecting applications and data from malicious users and to ensure information availability and integrity. Current trends in the IT Security Industry and budgeting guidelines are discussed, which will help organizations in making budgeting decisions for Application Security. Security breaches are discussed with impact and examples.

 

1. Introduction

Businesses today are under increasing pressure to be more accountable: accountable to investors, accountable to government, and accountable to the market (customers). Business accountability now includes security – specifically, software security Industry exp erts estimate that 70% of intrusion attempts are made at the application level. Reactive approaches such as patching are becoming increasingly ineffective with the growth of zero-day attacks (attacks that take advantage of software vulnerabilities for which there are no fixes) and the shrinking half-life of vulnerabilities (the time between when a vulnerability is released and when it is exploited).

 

The costs of application security are significant – and escalating. The U.S. Department of Commerce’s National Institute of Standards and Technology reports that software flaws each year cost the U.S. economy $59.6 billion, including the cost of attacks on flawed code. The report also confirmed that remediation of software security problems after the occurrence of security incidents is expensive and time -consuming – as much as six times the cost of fixing them during the coding/testing stage.
Web Applications – Attacks on Port 80: Web Applications are being increasingly used today by organizations to conduct business online. Many of these applications utilize HTTP through Port 80 and expose the organization to security threats from crafted requests, hostile mobile code, and inappropriate web content. Port 80 is used by all HTTP traffic and therefore always has to be left open. An attacker can pass a specifically crafted — but legitimate — HTTP message through the firewall to a Web server, exposing its vulnerabilities. Attacks buried in these messages sail past firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal HTTP requests. The HTTP message can then exploit one or more of these vulnerabilities and cause a chain of events that ultimately allows the intruder to obtain privileged access to the Web server machine. The vast majority of attacks, nearly 80 percent, are launched on port 80, the same port that Web traffic flows on. This poses a particular problem because curtailing access to port 80 would also negatively affect productivity and access to Web traffic.

 

2. The Scenario - Current Trends and Security Breaches

 

2.1 Current Trends in IT Security Industry

The Computer Security Institute (CSI) conducts the “Computer Crime and Security Survey “regularly. The survey covers the top 500 US Corporations, government agencies, financial institutions, medical institutions and
universities. The following are some of the highlights of a recent survey by CSI: -

Budget Allocation - Up to 5% of IT Budget spent for IT Security

An increased investment in IT Security resulting in decreased Financial Losses

Losses of $142 Million reported amongst 480 top US Companies due to Cyber Attacks

Insurance - More Organizations (currently 30%) opting for Cyber Security Insurance

Audits & Training - More Organizations (currently 80%) conducting Security Audits and Security Awareness Training

There is likely to be an increase in investments on IT Security initiatives, with many legal laws and acts coming into picture. Especially, the Sarbanes-Oxley Act (SOX), currently drawing much limelight, requires stringent Security Controls to be implemented on Applications dealing with financial data. Also, ensuring compliance with Security Standards such as BS7799 require significant investment in IT Security.

 

2.2 Security Breaches

A security breach of an application is the violation of security controls built in the application in order to gain unauthorized access to application resources.

 

Examples of Security Breaches: -

Employee tampering with Payroll Data

Airlines tricked into selling air travel tickets for a few dollars

Exposure of Online Customers' credit card details

Manipulation of Corporate Company's invoice/billing data

Websites defaced with controversial content

   

Impact of Security Breaches: -

IT Staff – Wastage of Manpower: This happens due to additional efforts of IT Staff for fixing/patching up the security flaws and for tracking down culprits.

Non-availability of information: This happens when business critical information is tampered with or made inaccessible by attacking and crashing the application servers.

Legal Consequences: Many cyber security laws/acts make it mandatory for companies to protect their customers’ confidential data. These laws hold the company accountable for any security breaches.

Increases in insurance premiums: With more IT companies opting for Cyber Security Insurance, repeated security breaches and losses could result in Insurance companies charging more premiums from organizations.

Loss of Public Image: Reported security breaches leads to negative publicity and loss of reputation.

Loss of Customer Trust: A large number of customer relationships are based on assurances of confidentiality of Customer Data. Such relations get affected when there is a breach in data confidentiality.

Competitor’s access to information: Any confidential or proprietary information falling into the hands of competitors could place them in an advantageous position and give them the edge.

 

To read the complete article please click here

 

CMM IntegrationSM, SCAMPISM, SCAMPISM Lead Appraiser, TSPSM, and IDEALSM are service marks of Carnegie Mellon University. CMMI®, Capability Maturity Model®, Capability Maturity Modeling®, CMM® and Carnegie Mellon® are registered in the US Patent and Trademark Office by Carnegie Mellon University. ITIL® is a Registered Trade Mark of the Cabinet Office (HM, Govt of UK) in the United Kingdom and other countries. CBTL and CBQA are service marks of QAI India Ltd. "PMI®" and the PMI® logo are service and trademarks registered in the United States and other nations. "PMP®" and the PMP® logo are certification marks registered in the United States and other nations.
© QAIeLearning and its licensors.