Security
- Frontend (FE)
- FE + BE
- Backend (BE)
- Database (DB)
- Infrastructure (Infra)
Type | Definition | Impact | Prevention |
---|---|---|---|
Clickjacking | Manipulating a website user's interaction by hiding clickable elements behind opaque layers | Trick users into performing undesired actions, potentially leading to sensitive data exposure | Implement X-Frame-Options HTTP response header. Use framebusting scripts |
Type | Definition | Impact | Prevention |
---|---|---|---|
Injection Flaws | Occur when untrusted data is sent to an interpreter as part of a command or query |
| Use prepared statements with parameterized queries, use safe API which avoids the use of interpreter entirely or provides a parameterized interface |
Cross-Site Scripting (XSS) | Injecting malicious scripts into web pages viewed by other users Types
|
|
|
Cross-Site Request Forgery (CSRF) | An attacker tricks a victim into performing actions on their behalf on a web application | Unauthorized actions performed on a user's behalf, potentially leading to data loss or account takeover |
|
Security Misconfiguration | Inadequate default security configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information | Unauthorized access to sensitive data, or functionality that can compromise the entire system | Regular security hardening of your servers, applications, and databases |
Insecure Direct Object References (IDOR) | When a web application exposes a reference to an internal implementation object | Unauthorized data access or manipulation |
|
Unvalidated Redirects and Forwards | Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination | Phishing attacks, forcing users to perform undesired actions or download malicious software |
|
Components with Known Vulnerabilities | Using software libraries or components with known vulnerabilities |
| Regularly update and patch all components used in the application |
Type | Definition | Impact | Prevention |
---|---|---|---|
Broken Authentication | When session management is not properly implemented, allowing attackers to compromise passwords, keys or session tokens | Unauthorized access to accounts and data |
|
Sensitive Data Exposure | When an application does not adequately protect sensitive information | Credit card fraud, identity theft, and other serious crimes |
|
Type | Definition | Impact | Prevention |
---|---|---|---|
SQL Injection | Technique where an attacker can inject SQL queries into an application to manipulate a database |
|
|
Inadequate Authentication/Authorization | Absence or poor implementation of user authentication or authorization process | Unauthorized access to sensitive data or critical functionalities |
|
Unencrypted Data | Storing sensitive data in plain text | Data breaches, exposing sensitive user or system information |
|
Data Leakage | Unintended transfer or exposure of data from within an organization to an external or untrusted destination | Financial losses, damage to brand reputation, legal penalties |
|
Insecure Database Configuration | Default or weak database configurations that can be easily exploited by attackers |
|
|
Database Vulnerabilities | Weaknesses or flaws in a database system that can be exploited |
|
|
Lack of Backup and Recovery Plan | Failure to regularly backup data and lack of a plan for data recovery | Data loss and system downtime in the event of a disaster or data corruption | Implement regular data backup |
Insecure Direct Object References (IDOR) | A vulnerability where an application exposes direct references to database records |
|
|
Excessive Privileges | Assigning more privileges to a database user than required |
|
|
Type | Definition | Impact | Prevention |
---|---|---|---|
Unpatched Software | Failure to regularly update software with security patches | System vulnerable to known threats | Regularly update and patch all software |
Insufficient transport layer protection | Failure to adequately secure data during transmission over networks | Leaves data vulnerable to interception and eavesdropping |
|
Distributed Denial of Service (DDoS) Attack | Coordinated efforts to overwhelm a target system or network with a flood of traffic |
|
|
Weak Passwords | Use of easily guessed or common passwords | Permits unauthorized access to systems | Implement strong password policies |
Lack of Encryption | Failure to encrypt sensitive data | If data is breached, it can be easily read and used maliciously | Encrypt all sensitive data, both in transit and at REST |
Poor Access Control | Failure to properly control who has access to data | Unauthorized users can access sensitive data or systems |
|
Phishing Attacks | Deceptive attempts to gain sensitive information |
| Use email filters to block known phishing attempts |
Malware Infection | Malicious software designed to cause harm |
|
|
Social Engineering | Manipulative tactics used to trick individuals into divulging sensitive information |
| Encourage a culture of security awareness |
Outdated Hardware | Using old or unsupported hardware | Older hardware may have known vulnerabilities that are not patched | Regularly update and replace hardware |
Lack of Incident Response Plan | Failure to have a plan in place for when a security incident occurs | Increased damage and slower recovery times | Develop and regularly update an incident response plan |
Unsecured APIs | APIs that do not have proper security measures in place | Unauthorized access to systems and data | Implement API security measures such as encryption, access control, and rate limiting |
Misconfigured Cloud Storage | Incorrectly configured cloud storage settings that leave data exposed |
| Regularly audit and test cloud storage configurations |
Password Storage​
Visualization | Specs |
---|---|
Store Password
| |
Validate Password
|
Uniform Resources​
Type | Definition | Identity Resources | Example |
---|---|---|---|
URI: Uniform Resource Identifier |
|
|
|
URL: Uniform Resource Locator |
| scheme://(domain name:port)authority/path to file?query string#anchor
| http://(mysite.com:80)authority/path/to/file.html?product=book#docAnchor |
URN: Uniform Resource Name |
| scheme://namespace/namespace specific string | urn://isbn/888 |
Inner Workflow​
- HTTPS
Visualization | Steps | Specs |
---|---|---|
|
|
Authentication Mechanisms​
- Overview
- Credentials
- JSON Web Token (JWT)
- Oauth 2.0
- SSH Keys
- SSL Certificates
- 2FA
- 2SA
Visualization | Specs |
---|---|
|
Visualization | Specs |
---|---|
|
2FA (Two-Factor Authentication)
Visualization | Specs |
---|---|
|
2SA (Two-Step Verification)