SlideShare a Scribd company logo
Quick Code
How to Secure Web Apps — A Web App
Security Checklist
Ajay Kapoor Follow
Aug 26, 2021 · 6 min read
These days, web apps are increasingly becoming integral to our lives as they are used
everywhere in the world. However, they often lack the kind of protection that
traditional software and operating systems have, making them vulnerable to both
Open in app Get started
internal and external sources.
As per Cyber Security crimes, the rate of cybercrimes is to cost the world $10.5 trillion
by 2025. The rise of ransomware, XSS attacks have become a nightmare for established
business enterprises worldwide. However, with the right strategy, you can e몭ectively
escape cyber threats.
Do you know the most concerning cyber threats?
Here’s what the experts feel.
Source: Statista
The rise of cyber threats has made web app security increasingly important, especially
since some of the most well-known institutions in the world have been breached at one
point or another because of their security 몭aws.
Here are the Top 9 Tips on Making your Web App Safe and Secured:
1) Web Application Scanners
Web application scanners test your sites for various vulnerabilities, such as SQL
injection or cross-site scripting (XSS). A more advanced tool used by web developers
to check out is a Burp Suite, which o몭ers a broader range of testing features and takes
more time to master than more straightforward tools.
If you’re building an e-commerce site, make sure that you always run it through at least
one type of scanner before going live. Some systems will automatically perform these
scans when you update them and alert you if they 몭nd any problems — so make sure
those are turned on!
Scanning tools aren’t perfect; they occasionally return false positives or report issues
that are harmless — be vigilant in double-checking their 몭ndings before taking action
based on them!
2) Don’t Use Easy-to-guess Passwords
Most people are familiar with using some variation of their name, birthday, or favorite
sports team to create a password they won’t forget — but those passwords are also
likely to be stolen by hackers.
Hackers’ most common trick is to access user databases full of clear-text passwords (in
other words, not scrambled) that can then be used for malicious purposes like identity
theft or distributed denial-of-service attacks.
Source: Statista Data Breaches
They can easily decode these passwords from usernames because many people use
easy-to-guess combinations like admin, password, or 12345. The best way to avoid
being part of that statistic is by choosing strong passphrases instead: sentences or
poems that you can remember but aren’t easy for others to guess.
3) Use Subdomains Instead of Host Names
You can’t eliminate security risks, but you can make yourself a more challenging target
to hit by using subdomains instead of hostnames to separate your work and personal
life on a single device or server.
4) Disable Integrated Windows Authentication (IWA)
Integrated Windows Authentication is a Microsoft network protocol that uses either
clear-text passwords or encryption challenge/response authentication over TCP port
139 to authenticate users when logging on to servers.
It gets enabled by default in Internet Information Services (IIS) 6 but can be disabled
via IIS Manager or Windows Registry Editor if desired by an administrator or system
owner.
Disabling IWA is typically done to avoid exposing users’ usernames and passwords over
a network connection. However, it also disables NTLM authentication, which can be an
issue if you have non-Microsoft clients connecting to your server with legacy operating
systems like Windows 95, 98, etc.
Apple computers were running Mac OS X version 10.3 or earlier before Kerberos
supported Mac OS X.
5) Set up a CAPTCHA
CAPTCHA simply stands for Completely Automated Public Turing test to tell Computers
and Humans Apart (sometimes called a human veri몭cation system). CAPTCHA is
generally used on a website to verify that you are human. Still, it has many other uses in
computing, such as password recovery, computer logins, user authentication, making
forms accessible to adaptive technology software like screen readers (software that
reads text on screen).
Or keyboard-only navigation interfaces, preventing automated spam submission on
webmail services. The list goes on! It’s a handy tool when dealing with potentially
problematic automatic input from users.
6) Test your Site Regularly for Vulnerabilities
Cookies are typically used to store session information or shopping cart data. But
keeping sensitive information such as passwords, credit card numbers, social security
numbers in cookies is very risky.
It can be easily captured through various means (including browser malware) or even
inadvertently disclosed in log 몭les that are often stored on a server, along with cookies
that are not automatically cleared between sessions.
Instead, you should consider using some form of database storage to save session data
that will help minimize potential exposure if someone happens to access it
inappropriately. For example, some browsers support SQLite databases, which can be
used in place of cookies if properly con몭gured.
7) Implement Secure Web Server Con몭guration Settings
The Apache HTTP Server is responsible for hosting almost two-thirds of websites on the
Internet today, making it one of the most famous pieces of software in history.
That also means more people use it than ever before to test new, vulnerable code —
code that blackhats can exploit. These malicious hackers create viruses to steal 몭nancial
data from unsuspecting victims or plant malware on servers that infect thousands of
others via email or downloads.
Keeping Apache secure is a must if you plan to run a website with sensitive information
on it. Here are some con몭guration changes you can make to increase security.
8) Avoid Putting Sensitive Data in Cookies
Cookies are supposed to be tiny bits of information that websites use to keep track of
information for things like logged-in users or a user’s shopping cart on an eCommerce
site. However, if you’re working with sensitive data like usernames or passwords,
storing it in a cookie is very risky.
If someone steals your cookies from one site, they could use them to access other parts
of your sites as well. Make sure any sensitive data is encrypted before storing it in a
cookie so that anyone else can’t read it even if they steal it from you. Alternatively, store
that information in a database instead so that there’s no risk of getting it stolen.
Cookie theft is a signi몭cant concern in e-commerce, especially since cookies are easily
read by sni몭ng tra몭c and can easily get stolen over an unencrypted Wi-Fi connection.
They are used to hold vulnerable encrypted credentials if your site isn’t served over
SSL/TLS or if encryption keys have been stored in clear text inside of them — not good!
If you’re looking for a quick way to make your cookies more secure, ensure they don’t
contain any sensitive data, like credit card numbers or passwords.
9) Keep Testing while Deploying Updates
Regularly creating and executing penetration tests will help you identify vulnerabilities
in your code that hackers could exploit. Penetration testing simulates real-world
attacks to see how far an intruder can get into a system.
In addition, manual pen tests may not reveal speci몭c design or architecture 몭aws that
automated tools can detect. If you don’t 몭x these 몭aws, they could enable intruders to
breach a network or conduct malware attacks on web application users. Testing after
deployment also helps ensure that new code doesn’t create more vulnerabilities than
patches.
Every time you add functionality to a program, it opens up security holes, so thorough
testing is crucial to ensuring integrity while updating applications.
Wrapping Up
It’s better to take precautions than to feel sorry later. Implement the top tips listed
above with the help of a leading web development company in India.
Sign up for Developer Updates
By Quick Code
Receive weekly updates about new posts on programming, development, data science, web
development and more Take a look.
Get this newsletter
By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information
about our privacy practices.
Web Development Web Website Design Web Design Security
Your email
WRITTEN BY
Ajay Kapoor Follow
Hey, I’m Ajay, a tech blogger working with PixelCrayons who loves to share his extensive tech-related
knowledge with like-minded people.
Quick Code Follow
Find the best tutorials and courses for the web, mobile, chatbot, AR/VR development, database
management, data science, web design and cryptocurrency. Practice in JavaScript, Java, Python, R,
Android, Swift, Objective-C, React, Node Js, Ember, C++, SQL & more.
More From Medium
6 Niche search engines you can explore
Techpremiumdomains
USDT CryptoFarm (05/19/2021)—Earn 8% Expected
Annualized Return
OceanEx Official
Australian Crypto Rules Will Usher in Monetary
Overhaul
Daysofcrypto
Just finished Defcon 2017!
Serge Romero
XSL Labs | DID
XSL Labs
Upcoming NFTs and 250,000 $HOPR Treasure Hunt
Rik Krieger in HOPR
Home Networking: Enable Pi-Hole On Asus Routers
Ali Bahraminezhad
29
EOSIO Weekly Update w/ Corey Cottrell & Jimmy D
(3.4.2021)
Jimmy D
About Write Help Legal
Get the Medium app

More Related Content

Similar to How to Secure Web Apps — A Web App Security Checklist

Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
ColumnInformationSecurity
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
ShivamSharma909
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
infosec train
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
Infosec Train
 
C01461422
C01461422C01461422
C01461422
IOSR Journals
 
How to Secure Your Website-Essential Web Development Practices
How to Secure Your Website-Essential Web Development PracticesHow to Secure Your Website-Essential Web Development Practices
How to Secure Your Website-Essential Web Development Practices
Rainsuit
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
Infosectrain3
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareLeigh Honeywell
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
WebSitePulse
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbers
Eoin Keary
 
Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
William Mann
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
SilverClouding Consultancy Pvt Ltd
 

Similar to How to Secure Web Apps — A Web App Security Checklist (20)

Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
 
C01461422
C01461422C01461422
C01461422
 
How to Secure Your Website-Essential Web Development Practices
How to Secure Your Website-Essential Web Development PracticesHow to Secure Your Website-Essential Web Development Practices
How to Secure Your Website-Essential Web Development Practices
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
Internet security
Internet securityInternet security
Internet security
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
OlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_FinalOlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_Final
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbers
 
Cyber security
Cyber securityCyber security
Cyber security
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
 

More from Pixel Crayons

Blockchain Disruption: How Is It Going To Affect Your Industry?
Blockchain Disruption: How Is It Going To Affect Your Industry?Blockchain Disruption: How Is It Going To Affect Your Industry?
Blockchain Disruption: How Is It Going To Affect Your Industry?
Pixel Crayons
 
The Future of Website Design is Revolutionary – Are You Ready to Embrace?
The Future of Website Design is Revolutionary – Are You Ready to Embrace?The Future of Website Design is Revolutionary – Are You Ready to Embrace?
The Future of Website Design is Revolutionary – Are You Ready to Embrace?
Pixel Crayons
 
10 Top Augmented Reality Ideas for Startups and SMEs
10 Top Augmented Reality Ideas for Startups and SMEs10 Top Augmented Reality Ideas for Startups and SMEs
10 Top Augmented Reality Ideas for Startups and SMEs
Pixel Crayons
 
Top Benefits of Digital Transformation in Healthcare Industry
Top Benefits of Digital Transformation in Healthcare IndustryTop Benefits of Digital Transformation in Healthcare Industry
Top Benefits of Digital Transformation in Healthcare Industry
Pixel Crayons
 
Testing in DevOps – The Basic and Critical Things You Need to Know
Testing in DevOps – The Basic and Critical Things You Need to KnowTesting in DevOps – The Basic and Critical Things You Need to Know
Testing in DevOps – The Basic and Critical Things You Need to Know
Pixel Crayons
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
Digital Transformation in Manufacturing: Benefits and Trends
Digital Transformation in Manufacturing: Benefits and TrendsDigital Transformation in Manufacturing: Benefits and Trends
Digital Transformation in Manufacturing: Benefits and Trends
Pixel Crayons
 
Node.js Vs. Python: The Most Confusing Back-End Dilemma
Node.js Vs. Python: The Most Confusing Back-End DilemmaNode.js Vs. Python: The Most Confusing Back-End Dilemma
Node.js Vs. Python: The Most Confusing Back-End Dilemma
Pixel Crayons
 
CHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BEST
CHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BESTCHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BEST
CHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BEST
Pixel Crayons
 
Future of Machine Learning: Ways ML and AI Will Drive Innovation & Change
Future of Machine Learning: Ways ML and AI Will Drive Innovation & ChangeFuture of Machine Learning: Ways ML and AI Will Drive Innovation & Change
Future of Machine Learning: Ways ML and AI Will Drive Innovation & Change
Pixel Crayons
 
7 Real-World Examples of Machine Learning in Current Times
7 Real-World Examples of Machine Learning in Current Times7 Real-World Examples of Machine Learning in Current Times
7 Real-World Examples of Machine Learning in Current Times
Pixel Crayons
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pixel Crayons
 
Are You a Startup? 30 Web App Ideas to Excite You
Are You a Startup? 30 Web App Ideas to Excite YouAre You a Startup? 30 Web App Ideas to Excite You
Are You a Startup? 30 Web App Ideas to Excite You
Pixel Crayons
 
The Impact of the Internet of Things on Web Design and Development
The Impact of the Internet of Things on Web Design and DevelopmentThe Impact of the Internet of Things on Web Design and Development
The Impact of the Internet of Things on Web Design and Development
Pixel Crayons
 
Top Python Web Development Frameworks for 2022
Top Python Web Development Frameworks for 2022Top Python Web Development Frameworks for 2022
Top Python Web Development Frameworks for 2022
Pixel Crayons
 
Top Web Development Challenges & How To Tackle Them?
Top Web Development Challenges & How To Tackle Them?Top Web Development Challenges & How To Tackle Them?
Top Web Development Challenges & How To Tackle Them?
Pixel Crayons
 
Why You Should Use MERN Stack for Startup Apps?
Why You Should Use MERN Stack for Startup Apps?Why You Should Use MERN Stack for Startup Apps?
Why You Should Use MERN Stack for Startup Apps?
Pixel Crayons
 
Top Blockchain Programming Languages: Choose the Best One for Your Business
Top Blockchain Programming Languages: Choose the Best One for Your BusinessTop Blockchain Programming Languages: Choose the Best One for Your Business
Top Blockchain Programming Languages: Choose the Best One for Your Business
Pixel Crayons
 
Hire India's Top Flutter Developers from PixelCrayons
Hire India's Top Flutter Developers from PixelCrayonsHire India's Top Flutter Developers from PixelCrayons
Hire India's Top Flutter Developers from PixelCrayons
Pixel Crayons
 
IT Outsourcing in Covid Environment: Is It Really Relevant?
IT Outsourcing in Covid Environment: Is It Really Relevant?IT Outsourcing in Covid Environment: Is It Really Relevant?
IT Outsourcing in Covid Environment: Is It Really Relevant?
Pixel Crayons
 

More from Pixel Crayons (20)

Blockchain Disruption: How Is It Going To Affect Your Industry?
Blockchain Disruption: How Is It Going To Affect Your Industry?Blockchain Disruption: How Is It Going To Affect Your Industry?
Blockchain Disruption: How Is It Going To Affect Your Industry?
 
The Future of Website Design is Revolutionary – Are You Ready to Embrace?
The Future of Website Design is Revolutionary – Are You Ready to Embrace?The Future of Website Design is Revolutionary – Are You Ready to Embrace?
The Future of Website Design is Revolutionary – Are You Ready to Embrace?
 
10 Top Augmented Reality Ideas for Startups and SMEs
10 Top Augmented Reality Ideas for Startups and SMEs10 Top Augmented Reality Ideas for Startups and SMEs
10 Top Augmented Reality Ideas for Startups and SMEs
 
Top Benefits of Digital Transformation in Healthcare Industry
Top Benefits of Digital Transformation in Healthcare IndustryTop Benefits of Digital Transformation in Healthcare Industry
Top Benefits of Digital Transformation in Healthcare Industry
 
Testing in DevOps – The Basic and Critical Things You Need to Know
Testing in DevOps – The Basic and Critical Things You Need to KnowTesting in DevOps – The Basic and Critical Things You Need to Know
Testing in DevOps – The Basic and Critical Things You Need to Know
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Digital Transformation in Manufacturing: Benefits and Trends
Digital Transformation in Manufacturing: Benefits and TrendsDigital Transformation in Manufacturing: Benefits and Trends
Digital Transformation in Manufacturing: Benefits and Trends
 
Node.js Vs. Python: The Most Confusing Back-End Dilemma
Node.js Vs. Python: The Most Confusing Back-End DilemmaNode.js Vs. Python: The Most Confusing Back-End Dilemma
Node.js Vs. Python: The Most Confusing Back-End Dilemma
 
CHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BEST
CHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BESTCHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BEST
CHOOSING THE BEST CRYPTOCURRENCY EXCHANGE — OPTIONS AND HOW TO CHOOSE THE BEST
 
Future of Machine Learning: Ways ML and AI Will Drive Innovation & Change
Future of Machine Learning: Ways ML and AI Will Drive Innovation & ChangeFuture of Machine Learning: Ways ML and AI Will Drive Innovation & Change
Future of Machine Learning: Ways ML and AI Will Drive Innovation & Change
 
7 Real-World Examples of Machine Learning in Current Times
7 Real-World Examples of Machine Learning in Current Times7 Real-World Examples of Machine Learning in Current Times
7 Real-World Examples of Machine Learning in Current Times
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
 
Are You a Startup? 30 Web App Ideas to Excite You
Are You a Startup? 30 Web App Ideas to Excite YouAre You a Startup? 30 Web App Ideas to Excite You
Are You a Startup? 30 Web App Ideas to Excite You
 
The Impact of the Internet of Things on Web Design and Development
The Impact of the Internet of Things on Web Design and DevelopmentThe Impact of the Internet of Things on Web Design and Development
The Impact of the Internet of Things on Web Design and Development
 
Top Python Web Development Frameworks for 2022
Top Python Web Development Frameworks for 2022Top Python Web Development Frameworks for 2022
Top Python Web Development Frameworks for 2022
 
Top Web Development Challenges & How To Tackle Them?
Top Web Development Challenges & How To Tackle Them?Top Web Development Challenges & How To Tackle Them?
Top Web Development Challenges & How To Tackle Them?
 
Why You Should Use MERN Stack for Startup Apps?
Why You Should Use MERN Stack for Startup Apps?Why You Should Use MERN Stack for Startup Apps?
Why You Should Use MERN Stack for Startup Apps?
 
Top Blockchain Programming Languages: Choose the Best One for Your Business
Top Blockchain Programming Languages: Choose the Best One for Your BusinessTop Blockchain Programming Languages: Choose the Best One for Your Business
Top Blockchain Programming Languages: Choose the Best One for Your Business
 
Hire India's Top Flutter Developers from PixelCrayons
Hire India's Top Flutter Developers from PixelCrayonsHire India's Top Flutter Developers from PixelCrayons
Hire India's Top Flutter Developers from PixelCrayons
 
IT Outsourcing in Covid Environment: Is It Really Relevant?
IT Outsourcing in Covid Environment: Is It Really Relevant?IT Outsourcing in Covid Environment: Is It Really Relevant?
IT Outsourcing in Covid Environment: Is It Really Relevant?
 

Recently uploaded

Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 

Recently uploaded (20)

Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 

How to Secure Web Apps — A Web App Security Checklist

  • 1. Quick Code How to Secure Web Apps — A Web App Security Checklist Ajay Kapoor Follow Aug 26, 2021 · 6 min read These days, web apps are increasingly becoming integral to our lives as they are used everywhere in the world. However, they often lack the kind of protection that traditional software and operating systems have, making them vulnerable to both Open in app Get started
  • 2. internal and external sources. As per Cyber Security crimes, the rate of cybercrimes is to cost the world $10.5 trillion by 2025. The rise of ransomware, XSS attacks have become a nightmare for established business enterprises worldwide. However, with the right strategy, you can e몭ectively escape cyber threats. Do you know the most concerning cyber threats? Here’s what the experts feel. Source: Statista The rise of cyber threats has made web app security increasingly important, especially since some of the most well-known institutions in the world have been breached at one point or another because of their security 몭aws.
  • 3. Here are the Top 9 Tips on Making your Web App Safe and Secured: 1) Web Application Scanners Web application scanners test your sites for various vulnerabilities, such as SQL injection or cross-site scripting (XSS). A more advanced tool used by web developers to check out is a Burp Suite, which o몭ers a broader range of testing features and takes more time to master than more straightforward tools. If you’re building an e-commerce site, make sure that you always run it through at least one type of scanner before going live. Some systems will automatically perform these scans when you update them and alert you if they 몭nd any problems — so make sure those are turned on! Scanning tools aren’t perfect; they occasionally return false positives or report issues that are harmless — be vigilant in double-checking their 몭ndings before taking action based on them! 2) Don’t Use Easy-to-guess Passwords Most people are familiar with using some variation of their name, birthday, or favorite sports team to create a password they won’t forget — but those passwords are also likely to be stolen by hackers. Hackers’ most common trick is to access user databases full of clear-text passwords (in other words, not scrambled) that can then be used for malicious purposes like identity theft or distributed denial-of-service attacks.
  • 4. Source: Statista Data Breaches They can easily decode these passwords from usernames because many people use easy-to-guess combinations like admin, password, or 12345. The best way to avoid being part of that statistic is by choosing strong passphrases instead: sentences or poems that you can remember but aren’t easy for others to guess. 3) Use Subdomains Instead of Host Names You can’t eliminate security risks, but you can make yourself a more challenging target to hit by using subdomains instead of hostnames to separate your work and personal life on a single device or server. 4) Disable Integrated Windows Authentication (IWA) Integrated Windows Authentication is a Microsoft network protocol that uses either clear-text passwords or encryption challenge/response authentication over TCP port 139 to authenticate users when logging on to servers. It gets enabled by default in Internet Information Services (IIS) 6 but can be disabled via IIS Manager or Windows Registry Editor if desired by an administrator or system owner.
  • 5. Disabling IWA is typically done to avoid exposing users’ usernames and passwords over a network connection. However, it also disables NTLM authentication, which can be an issue if you have non-Microsoft clients connecting to your server with legacy operating systems like Windows 95, 98, etc. Apple computers were running Mac OS X version 10.3 or earlier before Kerberos supported Mac OS X. 5) Set up a CAPTCHA CAPTCHA simply stands for Completely Automated Public Turing test to tell Computers and Humans Apart (sometimes called a human veri몭cation system). CAPTCHA is generally used on a website to verify that you are human. Still, it has many other uses in computing, such as password recovery, computer logins, user authentication, making forms accessible to adaptive technology software like screen readers (software that reads text on screen). Or keyboard-only navigation interfaces, preventing automated spam submission on webmail services. The list goes on! It’s a handy tool when dealing with potentially problematic automatic input from users. 6) Test your Site Regularly for Vulnerabilities Cookies are typically used to store session information or shopping cart data. But keeping sensitive information such as passwords, credit card numbers, social security numbers in cookies is very risky. It can be easily captured through various means (including browser malware) or even
  • 6. inadvertently disclosed in log 몭les that are often stored on a server, along with cookies that are not automatically cleared between sessions. Instead, you should consider using some form of database storage to save session data that will help minimize potential exposure if someone happens to access it inappropriately. For example, some browsers support SQLite databases, which can be used in place of cookies if properly con몭gured. 7) Implement Secure Web Server Con몭guration Settings The Apache HTTP Server is responsible for hosting almost two-thirds of websites on the Internet today, making it one of the most famous pieces of software in history. That also means more people use it than ever before to test new, vulnerable code — code that blackhats can exploit. These malicious hackers create viruses to steal 몭nancial data from unsuspecting victims or plant malware on servers that infect thousands of others via email or downloads. Keeping Apache secure is a must if you plan to run a website with sensitive information on it. Here are some con몭guration changes you can make to increase security. 8) Avoid Putting Sensitive Data in Cookies
  • 7. Cookies are supposed to be tiny bits of information that websites use to keep track of information for things like logged-in users or a user’s shopping cart on an eCommerce site. However, if you’re working with sensitive data like usernames or passwords, storing it in a cookie is very risky. If someone steals your cookies from one site, they could use them to access other parts of your sites as well. Make sure any sensitive data is encrypted before storing it in a cookie so that anyone else can’t read it even if they steal it from you. Alternatively, store that information in a database instead so that there’s no risk of getting it stolen. Cookie theft is a signi몭cant concern in e-commerce, especially since cookies are easily read by sni몭ng tra몭c and can easily get stolen over an unencrypted Wi-Fi connection. They are used to hold vulnerable encrypted credentials if your site isn’t served over SSL/TLS or if encryption keys have been stored in clear text inside of them — not good! If you’re looking for a quick way to make your cookies more secure, ensure they don’t contain any sensitive data, like credit card numbers or passwords. 9) Keep Testing while Deploying Updates Regularly creating and executing penetration tests will help you identify vulnerabilities in your code that hackers could exploit. Penetration testing simulates real-world attacks to see how far an intruder can get into a system. In addition, manual pen tests may not reveal speci몭c design or architecture 몭aws that automated tools can detect. If you don’t 몭x these 몭aws, they could enable intruders to breach a network or conduct malware attacks on web application users. Testing after deployment also helps ensure that new code doesn’t create more vulnerabilities than patches. Every time you add functionality to a program, it opens up security holes, so thorough testing is crucial to ensuring integrity while updating applications.
  • 8. Wrapping Up It’s better to take precautions than to feel sorry later. Implement the top tips listed above with the help of a leading web development company in India. Sign up for Developer Updates By Quick Code Receive weekly updates about new posts on programming, development, data science, web development and more Take a look. Get this newsletter By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices. Web Development Web Website Design Web Design Security Your email
  • 9. WRITTEN BY Ajay Kapoor Follow Hey, I’m Ajay, a tech blogger working with PixelCrayons who loves to share his extensive tech-related knowledge with like-minded people. Quick Code Follow Find the best tutorials and courses for the web, mobile, chatbot, AR/VR development, database management, data science, web design and cryptocurrency. Practice in JavaScript, Java, Python, R, Android, Swift, Objective-C, React, Node Js, Ember, C++, SQL & more. More From Medium 6 Niche search engines you can explore Techpremiumdomains USDT CryptoFarm (05/19/2021)—Earn 8% Expected Annualized Return OceanEx Official Australian Crypto Rules Will Usher in Monetary Overhaul Daysofcrypto Just finished Defcon 2017! Serge Romero XSL Labs | DID XSL Labs Upcoming NFTs and 250,000 $HOPR Treasure Hunt Rik Krieger in HOPR Home Networking: Enable Pi-Hole On Asus Routers Ali Bahraminezhad 29
  • 10. EOSIO Weekly Update w/ Corey Cottrell & Jimmy D (3.4.2021) Jimmy D About Write Help Legal Get the Medium app