{"id":2712,"date":"2019-11-20T08:22:42","date_gmt":"2019-11-20T13:22:42","guid":{"rendered":"https:\/\/www.titan.tech\/?p=2712"},"modified":"2021-09-30T01:01:22","modified_gmt":"2021-09-30T06:01:22","slug":"top-10-web-application-threats","status":"publish","type":"post","link":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/","title":{"rendered":"Top 10 Web Application Threats"},"content":{"rendered":"<p>To be forewarned is to be forearmed. The more that you know about the potential cybersecurity threats that every internet user faces, the better prepared you will be to combat them. In the area of web application security, nobody does it better than <a href=\"https:\/\/www.owasp.org\/index.php\/Main_Page\" target=\"_blank\" rel=\"noopener noreferrer\">the Open Web Application Security Project (OWASP)<\/a>. The OWASP Foundation may be best known for its OWASP Top Ten list, a collection of web application vulnerabilities that it updates every few years. We\u2019ll give you a brief introduction, but you may want to study the subject more in-depth on you own.<\/p>\n<p>The latest version of the <a href=\"https:\/\/www.owasp.org\/images\/7\/72\/OWASP_Top_10-2017_%28en%29.pdf.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">OWASP Top Ten<\/a> was published in 2017. Here is how they describe the list on the OWASP web page:<\/p>\n<p><em>\u201cThe OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.\u201d <\/em><\/p>\n<p>Businesses needing Cincinnati IT services can benefit from the support of Titan Tech with the web applications that they are either using or deploying. We can identify vulnerabilities and help you find ways to correct them.<\/p>\n<h3><strong>A1:2017 - Injection<\/strong><\/h3>\n<p>Despite all the hype, computers are stupid. They will do exactly what you tell them to do -- so long as it\u2019s within their preconfigured parameters. Injection occurs when a hacker adds extra command information to an input field so that the server executes unauthorized actions. It\u2019s a very common hack (especially SQL infection), and one that a security-conscious developer should be able to prevent. But it\u2019s probably not going away any time soon.<\/p>\n<h3><strong>A2:2017 - Broken Authentication<\/strong><\/h3>\n<p>This is another term for password hacking. If a cyber criminal manages to intercept or guess your password, he may have all he needs to access your important data. Experts recommend that you do everything you can to protect your password. Don\u2019t share it with anyone. Make sure you use strong passwords, and consider adding multifactor authentication when you have the opportunity.<\/p>\n<h3><strong>A3:2017 - Sensitive Data Exposure<\/strong><\/h3>\n<p>You wouldn\u2019t leave your door unlocked at night, but unfortunately some web administrators have left sensitive data unprotected. Even small businesses can house a lot of confidential information that could be a prime target for hackers. If a dog grooming company collects credit card information and leaves it on an unprotected server, they\u2019re leaving the door open for interested cyber thieves to freely enter.<\/p>\n<h3><strong>A4:2017 - XML External Entities (XXE)<\/strong><\/h3>\n<p>Web applications routinely use XML databases to collect and store data. Unfortunately, some XML data parsers will spit out protected data if the software is not configured properly. Knowledgeable hackers will enter malicious code to try and coax out the sensitive information. One way to prevent this is to disable XML external entity processing.<\/p>\n<h3><strong>A5:2017 - Broken Access Control<\/strong><\/h3>\n<p>Each user of an application is given a certain level of access. Some may have read-only access, while others can write to the database. Application owners will have admin access. Broken access control is when someone manages to get a higher access than he\u2019s supposed to. With elevated privileges, an unscrupulous user can do all kinds of things in the application that he\u2019s not supposed to do.<\/p>\n<h3><strong>A6:2017 - Security Misconfiguration<\/strong><\/h3>\n<p>Servers and software packages come with default settings. The problem is that some of those settings may make your system more vulnerable to attack. This is particularly risky if you get something off the shelf that may be a year or so old. Since it was put on the market, designers have likely discovered security flaws that must be addressed. That\u2019s why it\u2019s important to do updates immediately upon installation. That said, security misconfigurations anywhere in the IT infrastructure can leave a web application exposed.<\/p>\n<p><a href=\"https:\/\/www.titan.tech\/services\/managed-it-services\/\">Cincinnati's Best It Company - Titan Tech<\/a><\/p>\n<h3><strong>A7:2017 - Cross-Site Scripting (XSS)<\/strong><\/h3>\n<p>Web pages should not be running any script other than what the software coder has written. But cross-site scripting happens when a hacker puts his own script into a web form field in an attempt to extract data. A hacker\u2019s script might be entered into a freeform field such as a comment box. For example, if he enters <script> and then types text followed by <\/script>, he may succeed in giving commands to the server.<\/p>\n<h3><strong>A8:2017 - Insecure Deserialization<\/strong><\/h3>\n<p>Web applications manipulate and convert streams of data in various ways between the user and the server. Serialization and deserialization are part of this process. This hack occurs when the data is deserialized in a way that it is left unprotected. One way to prevent this is the use of digital signatures.<\/p>\n<h3><strong>A9:2017 - Using Components with Known<\/strong><\/h3>\n<p><strong>Vulnerabilities<\/strong><\/p>\n<p>Website owners must make sure that all the elements of their web applications are secure. That goes for any hardware or software components used by the website. The problem occurs when web administrators don\u2019t keep abreast of all the market information on the products that they use. If experts have identified some of those components as risky, then of course they should not use them.<\/p>\n<h3><strong>A10:2017 \u2013 Insufficient Logging &amp; Monitoring<\/strong><\/h3>\n<p>Not every web vulnerability is linked to malicious hacking. Sometimes it\u2019s just a matter of a system that is not properly controlled. This last web application threat deals with the lack of tools to track what is happening on a daily basis. While server logs can be used to determine whether a site has been hacked, they can also help IT administrators identify events that signify potential risks. Monitoring systems with properly configured thresholds can also quickly alert techs to problems in the system.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>This material may be a bit over the head of the average business owner. That\u2019s a good reason to look to <a href=\"https:\/\/www.titan.tech\/\">Titan Tech<\/a> for cybersecurity support if you are in the Cincinnati or Dayton area. Contact us today with all your web application security needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To be forewarned is to be forearmed. The more that you know about the potential cybersecurity threats that every internet user faces, the better prepared you will be to combat them. In the area of web application security, nobody does it better than the Open Web Application Security Project (OWASP). The OWASP Foundation may be [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2713,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-2712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 10 Web Application Threats - Titan Tech IT Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 Web Application Threats - Titan Tech IT Support\" \/>\n<meta property=\"og:description\" content=\"To be forewarned is to be forearmed. The more that you know about the potential cybersecurity threats that every internet user faces, the better prepared you will be to combat them. In the area of web application security, nobody does it better than the Open Web Application Security Project (OWASP). The OWASP Foundation may be [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Titan Tech\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-20T13:22:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-30T06:01:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats-600x314.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Titan Tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Titan Tech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\"},\"author\":{\"name\":\"Titan Tech\",\"@id\":\"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4\"},\"headline\":\"Top 10 Web Application Threats\",\"datePublished\":\"2019-11-20T13:22:42+00:00\",\"dateModified\":\"2021-09-30T06:01:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\"},\"wordCount\":974,\"image\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\",\"url\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\",\"name\":\"Top 10 Web Application Threats - Titan Tech IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.titan.tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png\",\"datePublished\":\"2019-11-20T13:22:42+00:00\",\"dateModified\":\"2021-09-30T06:01:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage\",\"url\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png\",\"contentUrl\":\"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png\",\"width\":1024,\"height\":512,\"caption\":\"Web Application Threats\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.titan.tech\/#website\",\"url\":\"https:\/\/www.titan.tech\/\",\"name\":\"Titan Tech\",\"description\":\"Leave IT to us\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.titan.tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4\",\"name\":\"Titan Tech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g\",\"caption\":\"Titan Tech\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 10 Web Application Threats - Titan Tech IT Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 Web Application Threats - Titan Tech IT Support","og_description":"To be forewarned is to be forearmed. The more that you know about the potential cybersecurity threats that every internet user faces, the better prepared you will be to combat them. In the area of web application security, nobody does it better than the Open Web Application Security Project (OWASP). The OWASP Foundation may be [&hellip;]","og_url":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/","og_site_name":"Titan Tech","article_published_time":"2019-11-20T13:22:42+00:00","article_modified_time":"2021-09-30T06:01:22+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats-600x314.png","type":"image\/png"}],"author":"Titan Tech","twitter_misc":{"Written by":"Titan Tech","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#article","isPartOf":{"@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/"},"author":{"name":"Titan Tech","@id":"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4"},"headline":"Top 10 Web Application Threats","datePublished":"2019-11-20T13:22:42+00:00","dateModified":"2021-09-30T06:01:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/"},"wordCount":974,"image":{"@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/","url":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/","name":"Top 10 Web Application Threats - Titan Tech IT Support","isPartOf":{"@id":"https:\/\/www.titan.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png","datePublished":"2019-11-20T13:22:42+00:00","dateModified":"2021-09-30T06:01:22+00:00","author":{"@id":"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.titan.tech\/2019\/11\/top-10-web-application-threats\/#primaryimage","url":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png","contentUrl":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png","width":1024,"height":512,"caption":"Web Application Threats"},{"@type":"WebSite","@id":"https:\/\/www.titan.tech\/#website","url":"https:\/\/www.titan.tech\/","name":"Titan Tech","description":"Leave IT to us","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.titan.tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.titan.tech\/#\/schema\/person\/d5fbca5fdaee154254d8b179f50c8af4","name":"Titan Tech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20c17e0d9364b8500becce7f911a817e44683c855a01592770e2cef8c204db84?s=96&d=mm&r=g","caption":"Titan Tech"}}]}},"yoast":{"focuskw":"","title":"","metadesc":"","linkdex":"","metakeywords":"","meta-robots-noindex":"","meta-robots-nofollow":"","meta-robots-adv":"","canonical":"","redirect":"","opengraph-title":"","opengraph-description":"","opengraph-image":"","twitter-title":"","twitter-description":"","twitter-image":""},"jetpack_featured_media_url":"https:\/\/www.titan.tech\/wp-content\/uploads\/2019\/11\/web-application-threats.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts\/2712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/comments?post=2712"}],"version-history":[{"count":3,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts\/2712\/revisions"}],"predecessor-version":[{"id":3185,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/posts\/2712\/revisions\/3185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/media\/2713"}],"wp:attachment":[{"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/media?parent=2712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/categories?post=2712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.titan.tech\/wp-json\/wp\/v2\/tags?post=2712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}