SlideShare a Scribd company logo
Data Protection & Privacy
Application Security Fundamentals
by Secure Code Warrior Limited is licensed under CC BY-ND 4.0
The application should implement
security controls to ensure the
protection and integrity of its
sensitive information.
What could happen?
An attacker could retrieve sensitive
and private information through
stolen log files, caching, man-in-the-
middle attacks or other means.
How to implement it?
Only store private information
that is absolutely required. Make
sure any stored or transmitted
information is properly secured
using encryption.
What’s the concept
about?
An internet payment company
called “Paybuddy” is taking
precautions to protect its
customers from credit card theft.
Communications to and from
the site are protected using
TLS, preventing attackers from
sniffing the traffic.
Credit card numbers are
stored encrypted in the
database using a strong
algorithm.
Credit card numbers are never
displayed in full, so attackers
cannot view the numbers
through shoulder surfing.
Caching is turned off as well.
Data Protection & Privacy
Understanding the concept
Properly protected
data
Web application
User: John
Doe
User Credit Card
John 69d4a73c196f60c3e453a9832fb4
admin 086569d4a73c196f60c3e453a983
Bart a73c196f60c3e453a9832fb4fz90o
bcrypt(creditcard)
CC:
XXXXXXX420
This time, “Paybuddy”
forgot to take
precautions to properly
protect their customers
and their data.
An attacker sniffs traffic between the
client and the server. He is able to steal
sensitive information, such as the
user’s credit card number.
An attacker that is able to
retrieve weakly hashed
credit card numbers won’t
have difficulties to decrypt
them using rainbow tables.
An attacker that is shoulder
surfing can see a full credit card
number in the application, which
can be abused to commit fraud.
Data Protection & Privacy
What could happen with the concept?
Unprotected data
Web application
User: John
Doe
User Credit Card
John a73c196f60c3e453a9832fb4
admin 69d4a73c196f60c3e453a983
Bart a7360c3e453a9832fb4fz90o
md5(creditcard)
User: John Doe
CC:
475629420
CC:
475629420
A software company is very
careful in protecting the
source code of their new
mobile application.
The source code repository is stored
on encrypted hardware in a secured
server room.
To protect the source
code in production,
heavy obfuscation
techniques are applied
to the application.
The source code repository can only
be accessed from their internal
network. Access to the repository is
limited to developers with the right
clearance.
Data Protection & Privacy
Understanding the concept Source code
protection
0101011
1010010
1001010
1011011
1001010
Developer X
Developer Y
Developer Z
The company’s intellectual
property is in danger due to
a lack of source code
protection.
The repository is stored on a
physically accessible server. Local
attackers can copy the code,
which is stored in clear text.
Without obfuscation, users can
decompile the application and
retrieve the source. It can be
modified and repackaged to be
sold by a third party.
The repository is publicly
accessible and therefore easier
to target by attackers.
Data Protection & Privacy
What could happen with the concept? Source code
unprotected
0101011
1010010
1001010
1011011
1001010
Developer X
Developer Y
Data Protection & Privacy
Understanding the concept User’s privacy
respected
User: John Doe
DoB: 29/02/1973
Sex: M
Location: Sydney
Religion: Pastafari
John’s
info DB Admin
A certain web application
allows users to create a
profile. The application
stores date of birth, sex,
location, and religion.
The user’s private information
is stored in a database with
restricted access.
Only the database administrator has
access to the database and the
information. Additionally, he had to
sign a non-disclosure agreement.
A certain web application
allows users to create a
profile. The application
stores date of birth, sex,
location, and religion.
The user’s private information
is stored in a database with
restricted access.
All developers working on the
application can view the user’s
private information in the
development database. This
clearly causes privacy issues.
Before a new release, the
database contents is copied to
a development environment for
testing purposes.
Data Protection & Privacy
What could happen with the concept?
Privacy issues
User: John Doe
DoB: 29/02/1973
Sex: M
Location: Sydney
Religion: Pastafari
John’s
info
John’s
info
Developer 1
Developer 2
Development
Data Protection & Privacy
Typical controls
Only store private information if absolutely needed.
Don’t hard-code secret information in source code.
Don’t store DB credentials or encryptions keys in plain text.
Securely store all sensitive user information.
Send traffic over a secure communication channel.
Inform users using a privacy policy.

More Related Content

PPT
E-Banking Web Security
Dragos Lungu
 
PPTX
HACKING AND PHISHING
santhuana sg
 
PPTX
Phishing
shivli0769
 
PPTX
Online security and payment system
Gc university faisalabad
 
PDF
E security and payment 2013-1
Abdelfatah hegazy
 
PPT
Phishing
HK Khemnani
 
PPTX
Cyber - Dark Web, Deep Web and More
Chirag Joshi, CISA, CISM, CRISC
 
E-Banking Web Security
Dragos Lungu
 
HACKING AND PHISHING
santhuana sg
 
Phishing
shivli0769
 
Online security and payment system
Gc university faisalabad
 
E security and payment 2013-1
Abdelfatah hegazy
 
Phishing
HK Khemnani
 
Cyber - Dark Web, Deep Web and More
Chirag Joshi, CISA, CISM, CRISC
 

What's hot (20)

PPTX
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
PDF
Privacy-preserving user identity in Identity-as-a-Service
Hoang Tri Vo
 
PPTX
Risks of E-commerce
anshutomar6
 
PPTX
Phishing
Yash Bhatt
 
PPTX
Security issues in E-commerce
nikitaTahilyani1
 
PPTX
E-commerce Security and Payment
Laguna State Polytechnic University
 
PDF
Phishing
defquon
 
PPT
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
ODP
Computer related risks presentation
leodegras
 
ODP
Computer related risks presentation
leodegras
 
PPTX
protection & security of e-commerce ...
Rishav Gupta
 
PDF
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
PPTX
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
PPT
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
PPTX
E-commerce & Security
NetstarterSL
 
PPT
6 e commerce security
Naveed Ahmed Siddiqui
 
PPTX
Security issues in e business
Rahul Kumar
 
PPT
E commerce security
Shakti Singh
 
PDF
Identity theft
Nick Chandi
 
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
Privacy-preserving user identity in Identity-as-a-Service
Hoang Tri Vo
 
Risks of E-commerce
anshutomar6
 
Phishing
Yash Bhatt
 
Security issues in E-commerce
nikitaTahilyani1
 
E-commerce Security and Payment
Laguna State Polytechnic University
 
Phishing
defquon
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
Computer related risks presentation
leodegras
 
Computer related risks presentation
leodegras
 
protection & security of e-commerce ...
Rishav Gupta
 
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
E-commerce & Security
NetstarterSL
 
6 e commerce security
Naveed Ahmed Siddiqui
 
Security issues in e business
Rahul Kumar
 
E commerce security
Shakti Singh
 
Identity theft
Nick Chandi
 
Ad

Viewers also liked (15)

PPTX
Secure Code Warrior - XQuery injection
Secure Code Warrior
 
PPTX
Secure Code Warrior - Issues with origins
Secure Code Warrior
 
PPTX
Secure Code Warrior - CRLF injection
Secure Code Warrior
 
PPTX
Secure Code Warrior - Least privilege
Secure Code Warrior
 
PPTX
Secure Code Warrior - Client side injection
Secure Code Warrior
 
PPTX
Secure Code Warrior - Fail securely
Secure Code Warrior
 
PPTX
Secure Code Warrior - Trust no input
Secure Code Warrior
 
PPTX
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
PPTX
Secure Code Warrior - Insufficient data encoding
Secure Code Warrior
 
PPTX
Secure Code Warrior - Logging
Secure Code Warrior
 
PPTX
Secure Code Warrior - Secure by default
Secure Code Warrior
 
PPTX
Secure Code Warrior - Cookies and sessions
Secure Code Warrior
 
PPTX
Secure Code Warrior - Robust error checking
Secure Code Warrior
 
PPTX
Secure Code Warrior - Local storage
Secure Code Warrior
 
PPTX
Secure Code Warrior - Unrestricted file upload
Secure Code Warrior
 
Secure Code Warrior - XQuery injection
Secure Code Warrior
 
Secure Code Warrior - Issues with origins
Secure Code Warrior
 
Secure Code Warrior - CRLF injection
Secure Code Warrior
 
Secure Code Warrior - Least privilege
Secure Code Warrior
 
Secure Code Warrior - Client side injection
Secure Code Warrior
 
Secure Code Warrior - Fail securely
Secure Code Warrior
 
Secure Code Warrior - Trust no input
Secure Code Warrior
 
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
Secure Code Warrior - Insufficient data encoding
Secure Code Warrior
 
Secure Code Warrior - Logging
Secure Code Warrior
 
Secure Code Warrior - Secure by default
Secure Code Warrior
 
Secure Code Warrior - Cookies and sessions
Secure Code Warrior
 
Secure Code Warrior - Robust error checking
Secure Code Warrior
 
Secure Code Warrior - Local storage
Secure Code Warrior
 
Secure Code Warrior - Unrestricted file upload
Secure Code Warrior
 
Ad

Similar to Secure Code Warrior - Privacy (20)

PDF
Cyber Security
JamshidRaqi
 
PDF
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni
 
PPTX
itmsday2.pptx
santoshmohanthy2
 
PPTX
Cyber Safety
Asim Sourav Rath
 
PPTX
How using Tor Browser + VPN can save you $1000 and more!
TalhaMTZ
 
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
PDF
Cryptograpy Exam
Lisa Olive
 
DOCX
What Happens to Your Data When a Company Gets Breached
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
PPTX
Analyzing Cyber-Attacks: Case Studies of Five Organizations
Boston Institute of Analytics
 
PDF
Dw communication
Arjun Chetry
 
PDF
Ipsec And Ssl Protocols ( Vpn )
Monique Jones
 
PDF
techalpha07
DEBARGHYACHATTERJEE7
 
PPTX
Mobile App Security: Enterprise Checklist
Jignesh Solanki
 
PPTX
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
PDF
Internet Security Essay
Best Online Paper Writing Service
 
PDF
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
PDF
What-is-computer-security
iamvishal2
 
PDF
GuardianGabriel
Brian Ethridge
 
PDF
ICDL Course Cyber Security module Syllabus
DanielKK2
 
PPTX
Blockchain in cyber security
zaarahary
 
Cyber Security
JamshidRaqi
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni
 
itmsday2.pptx
santoshmohanthy2
 
Cyber Safety
Asim Sourav Rath
 
How using Tor Browser + VPN can save you $1000 and more!
TalhaMTZ
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Cryptograpy Exam
Lisa Olive
 
What Happens to Your Data When a Company Gets Breached
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
Analyzing Cyber-Attacks: Case Studies of Five Organizations
Boston Institute of Analytics
 
Dw communication
Arjun Chetry
 
Ipsec And Ssl Protocols ( Vpn )
Monique Jones
 
Mobile App Security: Enterprise Checklist
Jignesh Solanki
 
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
Internet Security Essay
Best Online Paper Writing Service
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
What-is-computer-security
iamvishal2
 
GuardianGabriel
Brian Ethridge
 
ICDL Course Cyber Security module Syllabus
DanielKK2
 
Blockchain in cyber security
zaarahary
 

Recently uploaded (20)

PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Doc9.....................................
SofiaCollazos
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
The Future of Artificial Intelligence (AI)
Mukul
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Doc9.....................................
SofiaCollazos
 

Secure Code Warrior - Privacy

  • 1. Data Protection & Privacy Application Security Fundamentals by Secure Code Warrior Limited is licensed under CC BY-ND 4.0
  • 2. The application should implement security controls to ensure the protection and integrity of its sensitive information. What could happen? An attacker could retrieve sensitive and private information through stolen log files, caching, man-in-the- middle attacks or other means. How to implement it? Only store private information that is absolutely required. Make sure any stored or transmitted information is properly secured using encryption. What’s the concept about?
  • 3. An internet payment company called “Paybuddy” is taking precautions to protect its customers from credit card theft. Communications to and from the site are protected using TLS, preventing attackers from sniffing the traffic. Credit card numbers are stored encrypted in the database using a strong algorithm. Credit card numbers are never displayed in full, so attackers cannot view the numbers through shoulder surfing. Caching is turned off as well. Data Protection & Privacy Understanding the concept Properly protected data Web application User: John Doe User Credit Card John 69d4a73c196f60c3e453a9832fb4 admin 086569d4a73c196f60c3e453a983 Bart a73c196f60c3e453a9832fb4fz90o bcrypt(creditcard) CC: XXXXXXX420
  • 4. This time, “Paybuddy” forgot to take precautions to properly protect their customers and their data. An attacker sniffs traffic between the client and the server. He is able to steal sensitive information, such as the user’s credit card number. An attacker that is able to retrieve weakly hashed credit card numbers won’t have difficulties to decrypt them using rainbow tables. An attacker that is shoulder surfing can see a full credit card number in the application, which can be abused to commit fraud. Data Protection & Privacy What could happen with the concept? Unprotected data Web application User: John Doe User Credit Card John a73c196f60c3e453a9832fb4 admin 69d4a73c196f60c3e453a983 Bart a7360c3e453a9832fb4fz90o md5(creditcard) User: John Doe CC: 475629420 CC: 475629420
  • 5. A software company is very careful in protecting the source code of their new mobile application. The source code repository is stored on encrypted hardware in a secured server room. To protect the source code in production, heavy obfuscation techniques are applied to the application. The source code repository can only be accessed from their internal network. Access to the repository is limited to developers with the right clearance. Data Protection & Privacy Understanding the concept Source code protection 0101011 1010010 1001010 1011011 1001010 Developer X Developer Y Developer Z
  • 6. The company’s intellectual property is in danger due to a lack of source code protection. The repository is stored on a physically accessible server. Local attackers can copy the code, which is stored in clear text. Without obfuscation, users can decompile the application and retrieve the source. It can be modified and repackaged to be sold by a third party. The repository is publicly accessible and therefore easier to target by attackers. Data Protection & Privacy What could happen with the concept? Source code unprotected 0101011 1010010 1001010 1011011 1001010 Developer X Developer Y
  • 7. Data Protection & Privacy Understanding the concept User’s privacy respected User: John Doe DoB: 29/02/1973 Sex: M Location: Sydney Religion: Pastafari John’s info DB Admin A certain web application allows users to create a profile. The application stores date of birth, sex, location, and religion. The user’s private information is stored in a database with restricted access. Only the database administrator has access to the database and the information. Additionally, he had to sign a non-disclosure agreement.
  • 8. A certain web application allows users to create a profile. The application stores date of birth, sex, location, and religion. The user’s private information is stored in a database with restricted access. All developers working on the application can view the user’s private information in the development database. This clearly causes privacy issues. Before a new release, the database contents is copied to a development environment for testing purposes. Data Protection & Privacy What could happen with the concept? Privacy issues User: John Doe DoB: 29/02/1973 Sex: M Location: Sydney Religion: Pastafari John’s info John’s info Developer 1 Developer 2 Development
  • 9. Data Protection & Privacy Typical controls Only store private information if absolutely needed. Don’t hard-code secret information in source code. Don’t store DB credentials or encryptions keys in plain text. Securely store all sensitive user information. Send traffic over a secure communication channel. Inform users using a privacy policy.