Enhancing Security for E-Banking Applications: Best Practices and Guidelines
290 likes | 417 Vues
This presentation by Karen Baldacchino, dated September 15, 2012, focuses on auditing the security of e-banking applications. It aims to highlight vital resources for information security managers and auditors to effectively secure and review web applications. The agenda includes areas of study like Information Security Governance, Incident Management, and Web Application Security Measures. Key topics covered include risk management, intrusion detection, compliance with laws, and the implementation of security controls. This session encourages further exploration into mobile banking, cloud applications, and security for other web application types.
Enhancing Security for E-Banking Applications: Best Practices and Guidelines
E N D
Presentation Transcript
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15September2012
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
The Project • Title: Auditing the Security of E-banking Applications: • An Analysis of the Standards, Guidelines and Best PractisesAvailable • Objective: To highlight the mostusefulresourcesavailable to the information security manager and the information securityauditor in securing and reviewing the security of web applications.
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
Areas of Study Information Security Governance Information Security Policies & User Awareness Security Incident Management Communication Channel Security Logical Access Controls Change Management Systems Development Systems Backup & RecoveryProcedures Management of User Authentication Web-Application Specific Security Measures Monitoring of System Security Security Reviews and PenetrationTesting CompliancewithLaws, Regulations & Applicable Standards Outsourcing
Areas of Study Information Security Governance Information Security Policies & User Awareness Security Incident Management Communication Channel Security Logical Access Controls Change Management Systems Development Systems Backup & RecoveryProcedures Management of User Authentication Web-Application Specific Security Measures Monitoring of System Security Security Reviews and PenetrationTesting CompliancewithLaws, Regulations & Applicable Standards Outsourcing
Communication Channel Security Risks WEB STRIDE Attacks -- Tampering and Eavesdropping Message mis-routing or re-routing Message interception Covert channels
Communication Channel Security Controls Use of MAC, HMAC and Digital Signatures Use of public key certificate Adequate service levels from network service provider Use of SSL or IPSec Close unnecessary ports Disable unused protocols Use secure flag on cookies Harden the TCP/IP Stack
Monitoring of System Security Risks • Mis-use or compromise of security audit tools • Insufficient notifications and alerts • Failure to identifysuspicious transactions • Failure to respond to alerts • Use of keyloggers, form-grabbers and spyware • Scanning, foot-printing and fingerprinting
Monitoring of System Security Controls • Intrustiondetection and Intrusion preventionsystems • Security incident handling • Alerting on unauthorizedactivities • Alerting on unusualactivities • Use of network monitoring tools • Deploy software patches and anti-virus definitions in a timelymanner
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Selecting the Right Resources • Read the 40 resources Risks Register Controls Register
Agenda: The Project Areas of Study Selecting the Right Resources Ideas for FurtherStudies
FurtherStudyIdeas • Focus the study on other web-application types, eg: e-shopping, social networking etc. • Focus the study on mobile-banking applications • Focus the study on cloud-based applications • Apply the same methodology for supporting other areas such as Enterprise-wide Security Risk Management
Thankyou for Listening Any Questions? Contact Information: Karen Baldacchino Email: karen.baldacchino@gmail.com Tel: +356 2563 1263 Mob: +356 7904 6528 Skype:karenbaldacchino