Application Threats / Attacks
According to the patterns & practices Improving Web Application Security book, the following are classes of common application security threats / attacks:
Category | Threats / Attacks |
---|---|
Input Validation | Buffer overflow; cross-site scripting; SQL injection; canonicalization |
Authentication | Network eavesdropping ; Brute force attack; dictionary attacks; cookie replay; credential theft |
Authorization | Elevation of privilege; disclosure of confidential data; data tampering; luring attacks |
Configuration management | Unauthorized access to administration interfaces; unauthorized access to configuration stores; retrieval of clear text configuration data; lack of individual accountability; over-privileged process and service accounts |
Sensitive information | Access sensitive data in storage; network eavesdropping; data tampering |
Session management | Session hijacking; session replay; man in the middle |
Cryptography | Poor key generation or key management; weak or custom encryption |
Parameter manipulation | Query string manipulation; form field manipulation; cookie manipulation; HTTP header manipulation |
Exception management | Information disclosure; denial of service |
Auditing and logging | User denies performing an operation; attacker exploits an application without trace; attacker covers his or her tracks |
Read more about this topic: Application Security
Famous quotes containing the words application, threats and/or attacks:
“The human mind is capable of excitement without the application of gross and violent stimulants; and he must have a very faint perception of its beauty and dignity who does not know this.”
—William Wordsworth (17701850)
“Do not extort money from anyone by threats or false accusation, and be satisfied with your wages.”
—Bible: New Testament, Luke 3:14.
John the Baptist to Soldiers.
“Under peaceful conditions, the warlike man attacks himself.”
—Friedrich Nietzsche (18441900)