ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Web Application
Security
YOUSUF MOIN
IT SPECIALIST | TECHNOLOGY PROFESSIONAL
Point # 01
Allow the access from the trusted network and control the traffic of untrusted network with the
help of UTM box
Point # 02
Access mechanism must be encrypted
â—¦ Use the https protocol instead of http
â—¦ Use the proper SSL certificate
Point # 03
Implement two factor authentication
◦ You land on the website’s login screen and enter your username and password to request access to your
account.
◦ If you’ve only enabled two-factor authentication to activate if the request has been flagged, the system
will determine if you need to complete the additional verification step to ensure you’re not a hacker.
Point # 03
â—¦ A code will be sent via text message to the phone number you provided when you created the account.
During this time, you’ll be directed to a second login screen prompting you to enter the code.
◦ Once you’ve entered your passcode, the system will verify that the code you enter is the same as the
one that was sent to you.
◦ If there’s a match, you’ll be able to access your account.
Point # 04
Application design should be
External USer Internet
DMZ IPInternal Network IP
Internal User
Webpage request from Outside
Resolve from the public DNS entry that points to
the Firewall
Firewall
Allow and redirect request to only DMZ IP
Webpage request from Inside
Real time sync

More Related Content

Web application security

  • 1. Web Application Security YOUSUF MOIN IT SPECIALIST | TECHNOLOGY PROFESSIONAL
  • 2. Point # 01 Allow the access from the trusted network and control the traffic of untrusted network with the help of UTM box
  • 3. Point # 02 Access mechanism must be encrypted â—¦ Use the https protocol instead of http â—¦ Use the proper SSL certificate
  • 4. Point # 03 Implement two factor authentication â—¦ You land on the website’s login screen and enter your username and password to request access to your account. â—¦ If you’ve only enabled two-factor authentication to activate if the request has been flagged, the system will determine if you need to complete the additional verification step to ensure you’re not a hacker.
  • 5. Point # 03 â—¦ A code will be sent via text message to the phone number you provided when you created the account. During this time, you’ll be directed to a second login screen prompting you to enter the code. â—¦ Once you’ve entered your passcode, the system will verify that the code you enter is the same as the one that was sent to you. â—¦ If there’s a match, you’ll be able to access your account.
  • 6. Point # 04 Application design should be External USer Internet DMZ IPInternal Network IP Internal User Webpage request from Outside Resolve from the public DNS entry that points to the Firewall Firewall Allow and redirect request to only DMZ IP Webpage request from Inside Real time sync