BizNis Africa
Latest News
Nigerian Internet Exchange (IXPN) goes live at MainOne’s MDXi Lekki Data Center
MainData Nigeria (MDXi) and the Internet Exchange Point of...
The Next Einstein Forum launches search for 54 African science tech leaders
The Next Einstein Forum (NEF) on 23 February 2017,...
Samsung Electronics Ushers in a New Era in Home Entertainment with QLED TV
Samsung Electronics has launched its new QLED Q9, Q8,...
Caterpillar to open new parts distribution facility in South Africa
Caterpillar Inc today, 24 February 2017, announced plans to consolidate...
Germany-Africa Business Forum adds former Benin President as high-level speaker
The Germany-Africa Business Forum (www.GermanyAfrica.com), the first ever privately...
Samsung Corporate Citizenship aims to improve access to education
In keeping with Samsung’s goal to enrich and transform lives...
Eskom scoops global Technology Transfer Award
Eskom has been honoured with the 2017 Technology Transfer...
Samsung showcases latest tech trends at annual Africa Forum
Samsung is showcasing the latest range of products at the...
Sciences PO to join Mastercard Foundation Scholars Program
The MasterCard Foundation has announced a six-year, $8.2 million...
PwC offers tax comments for 2017 SA Budget review
As many pundits predicted, the Minister of Finance today...

Jonas Thulin, Fortinet Security Consultant

Vulnerable websites aren’t just a reputation risk, they leave an open door to your backend systems and company data, says Fortinet.

The days of the enterprise website serving as a static billboard are long gone. Now, websites are a valuable brand ambassador, and crucially, they are often also a channel to market and a conduit to the enterprise backend systems. In some cases, your site IS your business. Unfortunately, many South African companies still overlook the importance of effectively securing their websites.

A website’s greatest strength is also its greatest weakness, it is accessible to everyone. This makes a website a natural target for the cyber-criminal, hacker or hacktivist. Compounding this challenge is the fact that competition and business goals may drive web developers and designers to push site updates without proper security testing.

Regardless of the reason for the vulnerabilities or the motivation of attackers, a compromised website has serious implications – loss of revenue, negative impact to a company’s reputation and theft of sensitive information such as credit card numbers and personal data.

In South Africa, most of the high profile hacks recently have been hacktivist-style attacks on controversial or high-profile organisations. We’ve seen the defacement of the AARTO and Department of Health sites, the hack of the SAPS informants’ database, and the hacking of the Johannesburg City billing system, among others. These are just the widely-known cases. Unless cases go to court or are publicised, corporates are not likely to draw attention to site breaches.

In many cases, it requires extensive and careful forensic work to determine the extent of the breach if a site has been hacked. It is for good reason that hackers use the phrase “you’ve been owned” when they breach website security. Since most websites are connected in some way to multiple enterprise systems, there is a good chance that access via the website has allowed access to these systems. As a rule of thumb, enterprises should consider all their systems potentially vulnerable once their site has been touched.

Challenges in Securing Web Applications

A recent study by Verizon showed that the top two reasons for an attack on websites were theft (financial or personal gains) and hacktivism (disagreement or protest). These attacks can come in the form of exploits to existing security vulnerabilities in the operating system or web application software. More sophisticated forms of attacks like SQL injection and cross-site scripting are also used to gain access to sensitive data.

Verizon 2012 Data Breach report

While network security is relatively straightforward − define security policies to allow/block specific traffic to and from different networks/servers – web sites are made up of hundreds, and sometimes thousands, of different elements including URLs, parameters and cookies. Manually creating different policies for each of these items is almost impossible and obviously does not scale. In addition, web sites change frequently with new URLs and parameters being added, making it difficult for security administrators to update security policies.

The difficulty in protecting a website is further compounded by the ongoing discovery of software vulnerabilities of the actual website and the applications running on it, challenges in developing and applying updates, code revisions and updates, and time-to-market pressure.

Adding to this already complicated environment is the fact that behind most web sites is a distributed infrastructure of servers for the actual web site, its applications and databases, increasing the difficulty of securing these key elements.

The end result is that just like traditional applications and operating systems are considered inherently vulnerable, web-based applications cannot be assumed to be secure − they require independent security measures.

Protecting Your Online Assets
Protecting your website must take a holistic approach that includes the structure of the site and its applications as well as the underlying network. Fortinet recommends a three-pronged approach to tackling web application security:
• Secure Coding Practices and Code Reviews – Developing web applications securely and implementing a secure coding practice as part of the development life cycle should be an integral part of application development projects. By following the guidelines recommended by the Open Web Application Security Project (OWASP) and other bodies, users could build a more secure and trusted application. Once developed, the code should be reviewed by an independent third party.

• Perform Web Application Vulnerability Assessment / Penetration Testing – Applications should either be reviewed manually or through automated application vulnerability assessment tools to identify vulnerabilities. This could be further followed up with specific application penetration testing exercises for critical applications.

• Utilise a web application firewall – A web application firewall (WAF) allows organisations to detect and block application layer attacks. Such a specialised firewall is needed in addition to conventional network security solutions because traditional firewalls are designed to detect and combat attacks at the network and network port levels, not the application level. By complementing an existing network firewall with a WAF, you can address the unique requirements of web based applications and increase the overall security level of the network.

Many variations of WAFs exist today. Fortinet’s FortiWeb appliance, for instance, combines a WAF with XML Firewall capabilities in a single platform with several add-on modules like Vulnerability Scanning, Application Acceleration and Server Load Balancing that further complement the basic capabilities offered.

Comments are closed.

Ver peliculas online

Join our mailing list and you will receive our latest weekly news.

This information will never be shared for third part, we respect your privacy.

%d bloggers like this: