1. Unvalidated inputs Definition: Not checking whether text a user types into a field on a website is appropriate for that field. Problem: Hackers use these fields to type commands that allow them to scan for vulnerabilities and gain access. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe What you can do: Validate that each field accepts only those characters that are common for that field (such as numbers for a ZIP code field) and are an appropriate length. Run the inputs against a small library of ZIP codes and addresses to confirm that the information is valid. 2. Broken access control Definition: Access controls determine what a user can access after logging in to his personal account and blocks access to other accounts. Problem: About half of all websites have serious access problems because of poor testing during development. What you can do: Test all possible permutations of what a user may do to try to access information that is not his own.3. Broken authentication and session managementDefinition: After logging into a website with a user name and password, you receive a cookie that works like a hand stamp at a night club, authenticating your identity as you go through the site.Problem: Sometimes companies will customize authentication, inadvertently allowing hackers to infiltrate sessions and use the ID cookie to access the legitimate user’s account.What you can do: Rely on the built-in authentication schemes in the application; use secured sockets layer (SSL) to encrypt the session.4. Cross-site scripting Definition: When a hacker sends commands embedded in queries to a website.Problem: A hacker types JavaScript into any text field, such as a change-of-address field. When a legitimate user types information into that field, the JavaScript is activated, which allows the hacker to take control of the session and grants him all the user’s session rights, enabling him to move money or steal credit card numbers.What you can do: Make sure every text field will accept only those characters and length of characters that are suitable for that field—for example, five numbers in a ZIP code field and five numbers only.5. Buffer overflow Definition: Allows an attacker to input more information than the buffer can manage. Problem: Attacker can take control of application server, gaining access to all the data that the server manages. What you can do: Move away from C++ programming language, which is most vulnerable, to Java or .Net languages. If you must use C++, use static analysis tools to find overflow vulnerabilities. 6. Injection flawsDefinition: Web applications that use interpreters, specific so-called stake words that are instructions for a database to return specific information, are susceptible to commands written in the middle of a query, thereby changing the nature of the query.Problem: Hacker can send a specific command in a user name and password field so that instead of accessing one file or account attached to that user name and password, the database is commanded to send back all accounts. What you can do: Use parameter queries, in which the command and data are separate. Each command is associated with certain files, so that a hacker has no way to manipulate the command.7. Improper error managementDefinition: Purposefully inputting errors into fields to receive an error message or to open up a secure area.Problem: Error messages contain information about the information that may lie underneath, such as receiving an “access denied” message, which indicates a file is associate with the data the hacker input. What you can do: Keep track of errors and log users out after three errors. Do not provide specific information about the infrastructure or directory in error messages.8. Unsecured storageDefinition: Not protecting stored data using encryption, not properly securing the keys for accessing encrypted data, and not using effective randomness for passwords.Problem: Once a hacker gains access to a system, nonencrypted data is easily accessed or hacker can find unsecured encryption keys to gain access to encrypted data. What you can do: Do not store data that is not absolutely necessary for the operation of the business, and minimize use of encryption. If encryption is used, store the master secret to open the encryption in two locations (say, a configuration file and an external sever) and assemble it at runtime.9. Denial of ServiceDefinition: Sending thousands of queries to a Web server to overload the system, slowing it down or causing it to crash. Problem: While not an attack meant to steal personal information, the attack is meant to be purely malicious by slowing down a business’s online services and commerce. What you can do: Require users to log on to your site so that you process queries only from legitimate users. Limit the number of queries within a certain time frame per user. After three log-in failures, lock out the user for a certain amount of time to thwart a DNS attack on the log-in app.10. Insecure configuration managementDefinition: Unpatched security flaws on server, use of default passwords or improperly secure passwords, improper file and directory permissions, and others. Problem: A hacker scans for these vulnerabilities, and if found, gains access to administrative and other sensitive accounts.What you can do: Create configuration security guidelines that lay out the specific steps that developers and Web operations staff must check off. Removes the debates between staffs on how to set up proper configuration. Related content opinion The changing face of cybersecurity threats in 2023 Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 mins Cybercrime Security brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence brandpost Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations The CTO of SAP shares his experiences and learnings to provide actionable insights on navigating the GenAI revolution. By Juergen Mueller Sep 29, 2023 4 mins Artificial Intelligence feature 10 most in-demand generative AI skills Gen AI is booming, and companies are scrambling to fill skills gaps by hiring freelancers to make the most of the technology. These are the 10 most sought-after generative AI skills on the market right now. By Sarah K. White Sep 29, 2023 8 mins Hiring Generative AI IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe