• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.703 ■ Spring 2022 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

March 16, 2022 by David Lanter 41 Comments

Filed Under: 10 - Application Security Tagged With:

Reader Interactions

Comments

  1. Yangyuan Lin says

    March 17, 2022 at 9:24 pm

    What is the biggest risk to web applications and how to effectively mitigate that risk?

    Log in to Reply
    • Alexander William Knoll says

      March 22, 2022 at 11:13 pm

      In my opinion, one of the biggest risks to web application security is SQL Injections. To mitigate the risk, vulnerability & penetration testing should be used. Tools such as vulnerability scanners & source code analyzers can be useful in achieving this. Front-end validation can also mitigate the risk.

      Log in to Reply
  2. Corey Arana says

    March 19, 2022 at 7:29 am

    What problems does spam create?

    Log in to Reply
    • Matthew Bryan says

      March 20, 2022 at 10:53 am

      Spam clogs inboxes, slows email clients, reduces productivity, and generally annoys users.

      Spam can also be used to launch attacks and conduct reconnaissance on a target. For example, sending spam messages to accounts with auto-responders can yield information about active users and the company, e.g. “This user is no longer with the company. Please contact the front desk at…” . It can also show the attacker how the company responds to spam messages, e.g. blocking, filtering, etc. This can allow the attacker to probe for weaknesses under the guise of “benign” spam email.

      Log in to Reply
    • Yangyuan Lin says

      March 22, 2022 at 11:04 am

      Spam is unwanted information that may contain advertising, malicious, pornographic, and other content. Spam may be related to the security and protection of information and data. An influx of spam into email boxes can cause legitimate mail to be overwhelmed, employees may take longer to delete junk emails or be distracted and less productive. Malicious links hidden in spam emails, Trojans, and spyware can attack computers and cause data leaks or company network failures.

      Log in to Reply
  3. Shubham Patil says

    March 19, 2022 at 7:58 pm

    What can users do to enhance browser security?

    Log in to Reply
    • Matthew Bryan says

      March 20, 2022 at 10:15 am

      Adjusting the configuration options within the browser improves browser security. For example, most browsers offer options that control how the browser engages with sites and what features are allowed to run. Disabling scripts and Active-X from running by default improves the security of the browser. In addition, enabling pop-up blockers can prevent users from clicking malicious content.

      Log in to Reply
      • Oluwaseun Soyomokun says

        March 20, 2022 at 9:33 pm

        I agree a user needs to optimize the configuration options and keep the browser security up-to-date by installing the timely updates. Disabling the scripts and active-X from running and stay clear unsecured sites.

        Log in to Reply
      • Amelia Safirstein says

        March 22, 2022 at 1:06 pm

        Great points! Additionally, security awareness while surfing the web is important. Checking URLs before clicking on links, avoiding suspicious-looking websites, being cautious about entering private or confidential information, only downloading trusted files, etc. is important in security on the browser side as well.

        Log in to Reply
    • Alexander William Knoll says

      March 22, 2022 at 11:07 pm

      On top of what everyone else has mentioned, there are a few more recommendations I have, as well. Users should be sure to keep their browser of choice actively updated, as while as any browser add-ons. Also, while usually a given, users try to use complex passwords, not repeat the same password on every website they visit, and when possible have multi-factor enabled.

      Log in to Reply
  4. Amelia Safirstein says

    March 19, 2022 at 11:02 pm

    What measures would you take to protect an internal server/network from attacks on a public-facing server/application-hosting server?

    Log in to Reply
    • Mohammed Syed says

      March 20, 2022 at 10:45 pm

      Ensure that the perimeter firewall access control policies and procedures for internal servers or any zones of the organization network are verified before any attacks from outside occur. When configured properly the security devices in the organization. use IDS and IPS to track all packet floods and divide the network segmentation. Follow the Blacklisting and whistling IP ranges, ensure that the remote user’s connectivity via VPN as well.

      Log in to Reply
      • Amelia Safirstein says

        March 22, 2022 at 12:00 pm

        Great points, Mohammed! Additionally, since the public-facing web application server often has to communicate with an internal server (like a server hosting a database), input validation helps to ensure there isn’t harmful script being sent from the public-facing server to the internal one.

        Log in to Reply
  5. Elizabeth Gutierrez says

    March 19, 2022 at 11:59 pm

    What are the best mitigation methods for hardening a web application with reference to broken authentication attacks?

    Log in to Reply
    • Mohammed Syed says

      March 20, 2022 at 10:44 pm

      You should apply Multifactor authentication to prevent brute force and credential stuffing, stolen credentials. Also, implement digital identity in agreement with NIST 800-63. Ensure that the pathways used for account registration, credential recovery, and APIs are secured against account record attacks by providing a generic message for all outcomes. Verify the log failures along with alert messages when credential stuffing brute force or other attacks are detected.

      Log in to Reply
  6. Matthew Bryan says

    March 20, 2022 at 9:16 am

    Why are custom applications built internally by a firm less secure than third party applications? Why would a firm build an application vs buying one given the security concerns?

    Log in to Reply
    • Bryan Garrahan says

      March 21, 2022 at 9:06 pm

      The amount of security applied to an internally built custom application really depends on your developers understanding of requirements for security. From my experience, developers main priority is to provide robust functionality within the applications they develop. Typically, security is an afterthought or not even considered. Outsourcing the application to a third-party is usually a good option since the third-party likely has a lot of experience securing other clients applications. Also, if your organization lacks the human resources to develop and subsequently maintain an internally built application than this makes the decision to go with a third-party application even simpler for an organization.

      Log in to Reply
  7. Bryan Garrahan says

    March 20, 2022 at 12:37 pm

    Why does the OWASP top 10 base their data on incidence rates rather than frequency rates during the vulnerability identification process? How/why is this method better?

    Log in to Reply
    • Elizabeth Gutierrez says

      March 21, 2022 at 8:26 pm

      Hi Bryan,
      From my understanding, OWASP Top 10 base their data on incidence rates instead of frequency because it provides them with a better picture of what threats are faced by each application. It does not really benefit them to know the percentage of the application population in one instance of a vulnerability type. Not to mention, frequency-based data collection methods are known to exaggerate the risk of vulnerabilities that are easy to test for and occur frequently in a single application. Focusing on incidence rates is a better method because it corresponds to a risk related view, given the consideration that the attacker needs only one instance to attack an application successfully.

      Log in to Reply
      • Amelia Safirstein says

        March 22, 2022 at 12:16 pm

        To add to Elizabeth’s point, OWASP mentions that “human-assisted tools” i.e. software that does most of the work scanning applications tends to report all occurrences of each type of vulnerability while a “tool-assisted human” may find different vulnerabilities but they often would not report every single occurrence of each type of vulnerability.

        Log in to Reply
  8. Jason Burwell says

    March 20, 2022 at 3:03 pm

    Does someone need to understand every endpoint in order to understand the Attack Surface?

    Log in to Reply
    • Oluwaseun Soyomokun says

      March 20, 2022 at 6:22 pm

      Jason,
      I feel it is important to know more as professionals through being up-to-date about current attacks and vulnerabilities also how security controls are best practices to reduce the attack that are critical. Once a security professional have a map of the Attack Surface, Attack surface helps to identify the high risk areas and the remote entry points – interfaces with outside systems and to the Internet – and especially where the system allows anonymous, public access.
      These are often where that are most exposed to attack. Then understand what compensating controls needs to be in place, operational controls like network firewalls and application firewalls, and intrusion detection or prevention systems to help protect your application in the below areas:
      Network-facing, especially internet-facing code
      Web forms
      Files from outside of the network
      Backward compatible interfaces with other systems – old protocols, sometimes old code and libraries, hard to maintain and test multiple versions
      Custom APIs – protocols etc – likely to have mistakes in design and implementation
      Security code: anything to do with cryptography, authentication, authorization (access control) and session management

      Log in to Reply
  9. Oluwaseun Soyomokun says

    March 20, 2022 at 5:11 pm

    In your opinion, which risk of the OWASP top 10 is the most difficult to mitigate and why?

    Log in to Reply
    • Bryan Garrahan says

      March 21, 2022 at 7:45 pm

      I personally haven’t been involved in remediating or mitigating against any of the risks outlined in the OWASP top 10. However, when my company has third-parties come in to perform penetration tests and web application assessments my team attends the meetings where they present the results/findings to our security risk management team. After attending several of these meetings I’ve noticed a number of SQL injection and cross site scripting vulnerabilities are consistently identified as part of the findings. I believe the root cause is ultimately a lack of consistent input validation as part of the application development process.

      Log in to Reply
  10. Ryan Trapp says

    March 20, 2022 at 6:35 pm

    Should we apply encryption to all e-mail messages? If not, what situations would be the most applicable? What is the main reason why encrypting e-mail messages is not more prevalent?

    Log in to Reply
    • Corey Arana says

      March 21, 2022 at 5:59 pm

      I think that we should encrypt all e-mail messages. By encrypting all messages we send out makes our inboxes more secure. By only encrypting messages from time to time might stick out to a hacker and at that point make our message box less secure. I think the main reason encryption for email is not more prevalent is because email was never really meant to use or be encrypted, Email was originally meant to be simple and not secret, on the surface.

      Log in to Reply
      • Alexander William Knoll says

        March 22, 2022 at 11:02 pm

        I agree with your last point. Email was initially intended to be a simple communications method, and not something that would turn into a commonplace for cyber security attacks, so their systems are typically not secure. I assume email encryption would probably a huge pain for the common sender, and probably not something that they would much care about.

        Log in to Reply
  11. Michael Galdo says

    March 20, 2022 at 10:31 pm

    What are some of the risk control tactics when it comes to protecting against attacks on e-commerce?

    Log in to Reply
  12. Michael Duffy says

    March 20, 2022 at 11:09 pm

    What are some technical issues does Voice over IP (VoIP) pose for a network?

    Log in to Reply
    • Bryan Garrahan says

      March 21, 2022 at 8:48 pm

      There are a number of threats associated with VoIP including but not limited to caller impersonation and denial of service attacks. DoS attacks can be exploited on phones and a number of different servers in a VoIP network by modifying latency performance. Additionally, caller impersonation has proven to be more effective on VoIP networks than traditional soft phones to perform social engineering attacks.

      Log in to Reply
    • Elizabeth Gutierrez says

      March 21, 2022 at 10:30 pm

      Hi Michael,
      While VoIP offers a third dimension to voice communication, merging the voice and data worlds introduces security risks. There are a couple technical issues involving VoIP that come to mind. Threats that VoIP face range from eavesdropping to denial of service and man-in-the-middle attacks. Unfortunately, VoIP protocols were not designed with security as a primary concern. For example, one of its biggest risks is that there is no encryption involved and if an attack occurs, you can not trace it. By decoding the interception, hackers are able to listen in on calls; obviously, this is problematic considering it is a serious breach of security.

      Log in to Reply
      • Hang Nu Song Nguyen says

        March 22, 2022 at 8:46 am

        I agree with Elizatbeth that VoIP protocols was not designed with security as a primary concern. For me, it is designed for convenience. The main disadvantage of VoIP compared to traditional lines is that VoIP is completely dependent on the strength of broadband connections. It will affect availability. Also, Elizabeth said, “one of its biggest risks is that there is no encryption involved”. To make VoIP is reliable, it is easier to deal with its availability than confidentiality.

        Log in to Reply
  13. Joshua Moses says

    March 20, 2022 at 11:58 pm

    There were a lot of attacks that were mentioned and outlined in this week reading of Boyle and Panko’s book. These attacks ranged from various web server attacks to a few examples of web browser attacks. Is there any attack that stood out to you? If so, which one/s and why?

    Log in to Reply
    • Elizabeth Gutierrez says

      March 21, 2022 at 11:14 pm

      With regards to web browser attacks on section 8.3 of the textbook, mobile code, consisting of commands written into a webpage stood out to me. I learned that by intercepting client traffic using the man-in-the-middle technique, hackers can modify the original mobile code to be executed on the client’s machine under their credentials. Otherwise, it is also possible for the malicious mobile code to be hosted in an untrustworthy website (which we frequently visit all the time) or it could be permanently injected on a vulnerable webpage.

      Log in to Reply
    • Hang Nu Song Nguyen says

      March 22, 2022 at 8:35 am

      Hi Joshua,
      For me, buffer overflow attacks make me think about security coding. Buffer overflow attacks can come from non-intention. If developers follow OWASP security coding practices, the software applications. web applications will be less vulnerabilities.

      Log in to Reply
    • Joshua Moses says

      March 22, 2022 at 11:53 pm

      Hello Elizabeth and Hang,

      I am glad that I asked this question. You two gave some very astounding examples of attacks in this week’s reading. Elizabeth, I like what you said about man-in-the-middle attacks. I am familiar with those from studying the CompTIA Security+. You gave some insight and helped me capitalize on my knowledge of it with your example. Hang, I am also familiar with the buffer overflow attacks, I haven’t studied the material since 2013.. so you two are definitely jogging my memory!

      Log in to Reply
  14. Hang Nu Song Nguyen says

    March 20, 2022 at 11:58 pm

    Is using Leap files to increase e-mail security or a technique to mitigate risks to third party vendor?

    Log in to Reply
  15. Ornella Rhyne says

    March 21, 2022 at 6:03 pm

    What would be the issue if one of the 10 categories of OWASP is missing when adopting an application security standard?

    Log in to Reply
    • Hang Nu Song Nguyen says

      March 22, 2022 at 8:23 am

      Hi Ornella,
      As we know, OWASP Top 10 provides the top 10 most critical web application security risks and these risks are ranked based on the frequency of discovered security defects, the severity of the vulnerabilities, and the magnitude of their potential impacts. Moreover, based on nature of business and cost-benefit analysis, each firm will invest different way in security plan and also accept their own risk appetite. To answer your question, how impact of missing to business continuity is the issue.

      Log in to Reply
  16. Alexander William Knoll says

    March 22, 2022 at 10:52 pm

    What do you think the major reasoning is behind Broken Access Control making the jump to position #1 on OWASP’s top 10, even surpassing Injection attacks, which has been consistently ranked as one of the top cybersecurity threats?

    Log in to Reply
  17. Miray Bolukbasi says

    April 19, 2022 at 12:21 pm

    Why do you think the OWASP Attack Surface Cheatsheet highlights unauthorized and high privileged users instead of other users while assessing point of entries and risks categorization?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in