Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Sec 335 Web App Security Summarized

Rating
-
Sold
-
Pages
7
Uploaded on
06-05-2024
Written in
2023/2024

This document contains a summary of the chapter of WebApp Security, this document covers page 1 to page 80 with great detail. It would be of a great benefit to the students of Zayed University that take SEC-335.

Institution
Course

Content preview

WebApp Chapter Notes:


● Internet is the physical set of networks providing many services
● World Wide Web is a set of applications running on top of the Internet
● Majority of Internet attacks aimed at Web applications

● Simple Mail Transfer Protocol (SMTP)
○ Used to send Internet mail
● Post Office Protocol 3 (POP3) and Internet Message Access Protocol (IMAP)
○ Used to retrieve Internet mail
● Protocols operate within Application layer of the OSI reference model
● SMTP TCP/UDP Port 25
● POP3 TCP/UDP Port 110
● IMAP TCP/UDP Port 143
● SSH TCP/—- Port 22


● An open mail relay is a SMTP server configured in such a way that it allows anyone on
the to send email through it, not just mail destined to or originating from known users.
● Mail bombing
○ E-mail based denial of service attack - sending of a massive amount of e-mail to
a specific person or system.
● SMTP, POP AND IMAP security solutions:
● Restrict mail relayed on the email server
● Test server configuration to be sure it is not set up as open relay
● Use real-time blacklisting
● Authenticate on POP before allowing mail sent through SMTP server
● File Transfer Protocol (FTP)
○ Simple method of transferring files between computer systems
○ Operates in the Application layer of the OSI reference model
○ Requires two TCP ports for communications
■ Command port and data port

, ● Trivial File Transfer Protocol (TFTP)
○ Used to transfer data files
○ Fewer features than FTP
○ Uses only one port
● Used most often on network appliances
○ To transfer configuration files, backups, and boot files
○ Best option to avoid the use of TFTP and FTP
○ Use encryption and authentication
○ Avoid anonymous FTP
● Telnet:
○ Application-layer protocol for remote computer connection.
○ Users remotely access a shell to run programs and perform actions.
○ Vulnerable to attacks due to:
○ Misconfigured servers.
○ Unencrypted traffic over the network.
○ Allows sniffers to monitor sessions.
● Telnet Security Solutions:
○ Best practice: Avoid using Telnet.
○ Use Secure Shell (SSH) or other encrypted tools instead.
○ Enforce strong passwords and appropriate user rights.
○ Limit server exposure to the Internet.
○ Require external users to connect via VPN.
● Secure Shell (SSH):
○ Establishes a secure channel between systems.
○ More secure than Telnet for remote logins.
○ Widely used in electronic commerce.
○ Utilizes public key encryption for session establishment.

Written for

Course

Document information

Uploaded on
May 6, 2024
Number of pages
7
Written in
2023/2024
Type
SUMMARY

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
tea2

Get to know the seller

Seller avatar
tea2 Zayed University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
4
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions