Canberra OWASP Chapter meeting

Slides:



Advertisements
Similar presentations
OWASP Mobile Top 10 Beau Woods
Advertisements

Application Security Best Practices At Microsoft Ensuring the lowest possible exposure and vulnerability to attacks Published: January 2003.
Do’s and Don’ts for web application developers
OWASP Top 10 Mobile Risks Appsec USA Minneapolis, MN
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
SEC835 OWASP Top Ten Project.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Man-In-The-Front Ray Kelly.
OWASP Principles for GIS Data Security Keeping your GIS data secure.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Metro (down the Tube) Security Testing Windows Store Apps Marion McCune – ScotSTS Ltd.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
PV213 Enterprise Information Systems in Practice 09 – Security, Configuration management PV213 EIS in Practice: 09 – Security, Configuration management.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
OWASP Zed Attack Proxy Project Lead
Testing Tools. Categories of testing tools Black box testing, or functional testing Testing performed via GUI. The tool helps in emulating end-user actions.
Software Confidence. Achieved. Mobile Security and Payments Infrastructure 1 AJ Dexter Sr. Security Consultant.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
An Inside Look at Mobile Security Android & iOS Zachary Hance & Andrew Phifer Dr Harold Grossman.
OWASP Cambridge 2 nd December Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ESAPI SwingSet An introduction by Fabio Cerullo.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
Copyright 2009 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Deconstructing API Security
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
OWASP London 4 th December Agenda Networking, food and refreshments Welcome Justin Clark Offensive OSINT Christian Martorella and Zigor Zumalde.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
INTRODUCTION CHARLES MUIRURI
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Finding and Fighting the Causes of Insecure Applications
CompTIA Security+ Study Guide (SY0-401)
BOMGAR REMOTE SUPPORT Karl Lankford
OWASP Secure Coding Practices Quick Reference Guide
Sioux Falls OWASP Jan-2018 Mobile Top 10
An Introduction to Web Application Security
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Canberra OWASP Chapter meeting
Finding and Fighting the Causes of Insecure Applications
Online Data Collection: Ethics
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Presentation transcript:

Canberra OWASP Chapter meeting Andrew Muller Canberra Chapter Leader andrew.muller@owasp.org 0400 481 179 19th July 2012

Chapter meetings First Wednesday every three months* Next meetings: 4th August 2012 ??? 5th September 2012 5th December 2012 6th March 2013*

Comms Subscribe to OWASP Canberra mailing list Speak

News Formspring – ~?,000,000 accounts Phandroid forums - ~1,000,000 accounts Nvidia forums - ~400,000 accounts Billabong - ~35,000 password Yahoo Voice – ~450,000 passwords billabong, 123456, 12345, passwords 123456, password, welcome, ninja Stored in plaintext FFS!

Mobile Security Project Threat Model Top Ten Risks Top Ten Controls Secure Development Security Testing (guide, GoatDroid, iGoat) Cheat Sheets https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

Top Ten Risks Insecure Data Storage Weak Server Side Controls Insufficient Transport Layer Protection Client Side Injection Poor Authorization and Authentication Improper Session Handling Security Decisions Via Untrusted Inputs Side Channel Data Leakage Broken Cryptography Sensitive Information Disclosure

Top Ten Controls Identify and protect sensitive data on the mobile devices Handle password credentials securely on the device Ensure sensitive data is protected in transit Implement user authentication, authorisation and session management correctly Keep the backend APIs and platform secure Secure data integration with third party services and applications Pay attention to collection and storage of consent for collection and use of user’s data Implement controls to prevent unauthorised access to paid-for resources Ensure secure distribution/provisioning of mobile applications Carefully check any runtime interpretation of code for errors

Guest Speaker Jacob West Director Software Security Research at HP Enterprise Security Products