SlideShare a Scribd company logo
2
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Agenda
01
Introduction to
Cybersecurity
02
What is Application
Security?
03
SQL Injection
Attack
Most read
9
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Application Security
Most read
12
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Top Web Application Vulnerabilities
Cross-site Scripting
Cross-site Request
Forgery
Remote File Inclusion
SQL Injection
Broken Access Control
Broken Authentication
Most read
Application Security | Application Security Tutorial | Cyber Security Certification Course | Edureka
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Agenda
01
Introduction to
Cybersecurity
02
What is Application
Security?
03
SQL Injection
Attack
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Introduction to Cybersecurity
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Evolution Of Internet
THEN NOW
Communicating to each
other
Playing games, shopping, reading
news etc
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cyberattack
Phishing
Malware
DDoS
MITM
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Phishing
Malware
DDoS
MITM
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
CYBER
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cybersecurity
Cyber security refers to the body of technologies, processes, and practices designed
to protect networks, devices, programs, and data from attack, damage, or
unauthorized access.
Application Security
Network Security
Information Security
Operational Security
Disaster Recovery
End-user Education
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Application Security
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Application Security
ApplicationApplication security is the use of software, hardware,
and procedural methods to protect applications from
external threats.
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Why Target Applications?
Inherent complexity of the application source code
Ease of execution, automated attacks against
multiple targets
High value rewards for sensitive data breach
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Top Web Application Vulnerabilities
Cross-site Scripting
Cross-site Request
Forgery
Remote File Inclusion
SQL Injection
Broken Access Control
Broken Authentication
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Web Application Security Checklist
Web Application Firewalls
Information Gathering
Authorization
Cryptography
Resilience against attacks
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
SQL Injection Attack
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
SQL Injection
SQL injection, also known as SQLI, is a common attack vector that uses
malicious SQL code for backend database manipulation to access information
that was not intended to be displayed
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;
User ID: 105 OR 1=1 SELECT * FROM Users WHERE UserId = 105 OR 1=1;
The SQL query will return all the rows from
Users table, since OR 1=1 is always true
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Demo: SQL Injection Attack
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related Content

What's hot (20)

Cybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security
Cyber security
Pihu Goel
 
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Cyber security
Cyber security
Manjushree Mashal
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Information security awareness - 101
Information security awareness - 101
mateenzero
 
Cyber security
Cyber security
manoj duli
 
Network security
Network security
Estiak Khan
 
Secure coding practices
Secure coding practices
Mohammed Danish Amber
 
Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Web Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
cyber security
cyber security
BasineniUdaykumar
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
211 Check
 
Cyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Introduction To Information Security
Introduction To Information Security
belsis
 
Cybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security
Cyber security
Pihu Goel
 
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Information security awareness - 101
Information security awareness - 101
mateenzero
 
Cyber security
Cyber security
manoj duli
 
Network security
Network security
Estiak Khan
 
Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Web Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
211 Check
 
Cyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Introduction To Information Security
Introduction To Information Security
belsis
 

Similar to Application Security | Application Security Tutorial | Cyber Security Certification Course | Edureka (20)

Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
Comprehensive Cyber Security Course in Dubai: Your Path to IT Security Mastery
Comprehensive Cyber Security Course in Dubai: Your Path to IT Security Mastery
sudheeshoc79
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
Robert Smith
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 
2019 Metro Atlanta ISSA Conference - Cyber Security Careers
2019 Metro Atlanta ISSA Conference - Cyber Security Careers
Scott Stanton
 
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
Edureka!
 
Cyber security certification course
Cyber security certification course
chandrashekar965278
 
Career in cyber security
Career in cyber security
Manjushree Mashal
 
cybersecurity is the awareness to prevent cyber threats
cybersecurity is the awareness to prevent cyber threats
abhinaimc55
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
 
Cybersecurity Skills that Companies Are Desperately Hiring - Copy.pdf
Cybersecurity Skills that Companies Are Desperately Hiring - Copy.pdf
iibs College
 
Information Security: We are all InfoSec (updated for 2018)
Information Security: We are all InfoSec (updated for 2018)
Michael Swinarski
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
2021 BSides Tampa Cyber Security Careers
2021 BSides Tampa Cyber Security Careers
Scott Stanton
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber Security
stjohns9
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
Comprehensive Cyber Security Course in Dubai: Your Path to IT Security Mastery
Comprehensive Cyber Security Course in Dubai: Your Path to IT Security Mastery
sudheeshoc79
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
Robert Smith
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 
2019 Metro Atlanta ISSA Conference - Cyber Security Careers
2019 Metro Atlanta ISSA Conference - Cyber Security Careers
Scott Stanton
 
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
Edureka!
 
Cyber security certification course
Cyber security certification course
chandrashekar965278
 
cybersecurity is the awareness to prevent cyber threats
cybersecurity is the awareness to prevent cyber threats
abhinaimc55
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
 
Cybersecurity Skills that Companies Are Desperately Hiring - Copy.pdf
Cybersecurity Skills that Companies Are Desperately Hiring - Copy.pdf
iibs College
 
Information Security: We are all InfoSec (updated for 2018)
Information Security: We are all InfoSec (updated for 2018)
Michael Swinarski
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
2021 BSides Tampa Cyber Security Careers
2021 BSides Tampa Cyber Security Careers
Scott Stanton
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber Security
stjohns9
 
Ad

More from Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!
 
RPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!
 
What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!
 
RPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!
 
Ad

Recently uploaded (20)

Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Shashikant Jagtap
 
7 Salesforce Data Cloud Best Practices.pdf
7 Salesforce Data Cloud Best Practices.pdf
Minuscule Technologies
 
Domino IQ – Was Sie erwartet, erste Schritte und Anwendungsfälle
Domino IQ – Was Sie erwartet, erste Schritte und Anwendungsfälle
panagenda
 
Down the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training Roadblocks
Rustici Software
 
TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
 
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Impelsys Inc.
 
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Soulmaite review - Find Real AI soulmate review
Soulmaite review - Find Real AI soulmate review
Soulmaite
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
 
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
 
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
SMACT Works
 
Dancing with AI - A Developer's Journey.pptx
Dancing with AI - A Developer's Journey.pptx
Elliott Richmond
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
FME Beyond Data Processing Creating A Dartboard Accuracy App
FME Beyond Data Processing Creating A Dartboard Accuracy App
Safe Software
 
Your startup on AWS - How to architect and maintain a Lean and Mean account
Your startup on AWS - How to architect and maintain a Lean and Mean account
angelo60207
 
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Shashikant Jagtap
 
7 Salesforce Data Cloud Best Practices.pdf
7 Salesforce Data Cloud Best Practices.pdf
Minuscule Technologies
 
Domino IQ – Was Sie erwartet, erste Schritte und Anwendungsfälle
Domino IQ – Was Sie erwartet, erste Schritte und Anwendungsfälle
panagenda
 
Down the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training Roadblocks
Rustici Software
 
TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
 
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Impelsys Inc.
 
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Soulmaite review - Find Real AI soulmate review
Soulmaite review - Find Real AI soulmate review
Soulmaite
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
 
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
 
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
SMACT Works
 
Dancing with AI - A Developer's Journey.pptx
Dancing with AI - A Developer's Journey.pptx
Elliott Richmond
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
FME Beyond Data Processing Creating A Dartboard Accuracy App
FME Beyond Data Processing Creating A Dartboard Accuracy App
Safe Software
 
Your startup on AWS - How to architect and maintain a Lean and Mean account
Your startup on AWS - How to architect and maintain a Lean and Mean account
angelo60207
 

Application Security | Application Security Tutorial | Cyber Security Certification Course | Edureka

  • 2. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Agenda 01 Introduction to Cybersecurity 02 What is Application Security? 03 SQL Injection Attack
  • 3. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Introduction to Cybersecurity
  • 4. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Evolution Of Internet THEN NOW Communicating to each other Playing games, shopping, reading news etc
  • 5. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Cyberattack Phishing Malware DDoS MITM
  • 6. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Phishing Malware DDoS MITM
  • 7. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training CYBER
  • 8. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Cybersecurity Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Application Security Network Security Information Security Operational Security Disaster Recovery End-user Education
  • 9. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Application Security
  • 10. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Application Security ApplicationApplication security is the use of software, hardware, and procedural methods to protect applications from external threats.
  • 11. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Why Target Applications? Inherent complexity of the application source code Ease of execution, automated attacks against multiple targets High value rewards for sensitive data breach
  • 12. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Top Web Application Vulnerabilities Cross-site Scripting Cross-site Request Forgery Remote File Inclusion SQL Injection Broken Access Control Broken Authentication
  • 13. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training Web Application Security Checklist Web Application Firewalls Information Gathering Authorization Cryptography Resilience against attacks
  • 14. Copyright © 2018, edureka and/or its affiliates. All rights reserved. SQL Injection Attack
  • 15. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training SQL Injection SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed txtUserId = getRequestString("UserId"); txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId; User ID: 105 OR 1=1 SELECT * FROM Users WHERE UserId = 105 OR 1=1; The SQL query will return all the rows from Users table, since OR 1=1 is always true
  • 16. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Demo: SQL Injection Attack
  • 17. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training