Gameplay

3/Gameplay/grid-small

 Cyberoam Web Application Firewall 

Cyberrome Firewall

Cyberoam Unified Threat Management appliances offer identity-based comprehensive security to organizations against blended threats - worms, viruses, malware, data loss, identity theft; threats over applications viz. Instant Messengers; threats over secure protocols viz. HTTPS; and more. 


They also offer wireless security (WLAN) and 3G wireless broadband and analog modem support can be used as either Active or Backup WAN connection for business continuity.  


Cyberoam integrates features like stateful inspection firewall, VPN, Gateway Anti-Virus and Anti- Spyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Web Application Filtering, Data Leakage Prevention, IM Management and Control, Layer 7 visibility, Bandwidth Management, Multiple Link Management,

Cyberrome Firewall
Cyberome Firewall  in hardware  form

Comprehensive Reporting over a single platform.  Cyberoam has enhanced security by adding an 8th layer (User Identity) to the protocol stack. Advanced inspection provides L8 user-identity and L7 application detail in classifying traffic, enabling Administrators to apply access and bandwidth policies far beyond the controls that traditional UTMs support. 


It thus offers security to organizations across layer 2 - layer 8, without compromising productivity and connectivity.   Cyberoam UTM appliances accelerate unified security by enabling single-point control of all its security features through a Web 2.0-based GUI. An extensible architecture and an ‗IPv6 Ready‘ Gold logo provide Cyberoam the readiness to deliver on future security requirements.  Cyberoam provides increased LAN security by providing separate port for connecting to the publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are visible to the external world and still have firewall protection. 


Introduction

 Application Security is equivalent to preventing exception either in its security policy, or in the underlying system vulnerabilities in its design, development, or deployment. The rapid growth in technology has increased security threats concurrently. Automation lends sophistication to these threats against the Web applications, thereby addressing the need of security during the development. Developers write the Applications with an emphasis on time-to-market over security. Thus, with constant time to market pressure, a highly vulnerable Web infrastructure environment is created. Regardless of a carefully developed and audited application code, chances of vulnerabilities in the application and the framework that it supports still exist. Integrating various technologies to deploy complex architectures makes it susceptible to numerous vulnerabilities.  


 Such Applications are open to theft of intellectual property, resulting in business disruption, damage of brand reputation thereby loosing the customer trust. These vulnerabilities prove to be fatal for business directly affecting the revenue by endangering the sensitive data and critical business operations. In many cases, application security is also a legal requirement—such as complying with the PCI Data Security Standards, for example. Therefore, securing Web infrastructure of an organization requires attention, through knowledge and awareness from various areas of IT including the Web development, operations, infrastructure, and security teams.   


 Cyberoam‘s Web Application Firewall (WAF) aids in securing a Web application infrastructure. Cyberoam WAF is an operational security control, monitoring the HTTP and HTTPS traffic and protecting Web applications from attacks. 

Cyberrome

                          Terms used 


                           1.Defacement

 Defacement, in Web site security terminology, describes a form of vandalism in which a Web site or Web page is altered or marred by an unauthorized individual or process. Generally, it is done by logging on administrator‘s account by means of SQL injections. The information on the Web site or Web page is often replaced with undesirable information. This damages the reputation of the organization, leaving Website‘s visitors with an impression that the Website may be insecure and hence turn them off in order to protect its own property.  


                       2.Buffer Overflow

 Buffer overflow is the condition that occurs when the data transferred to a buffer via a program exceeds the storage capacity of that buffer and overflows into adjacent or other buffers, corrupting the data already contained in them.    Unauthorized users overwrite data that control the program execution by launching a buffer overflow attack. They hijack and control the program to execute the malicious code instead of actual process code.

                 3.URL Parameter 

Tampering Parameter Tampering is a type of Web-based attack in which certain query string parameter values of a Uniform Resource Locator (URL) sent to a Web site are altered in order to obtain unauthorized information. By doing so, unauthorized users can access the database and retrieve and/or modify its contents.  

                   4.Cookie poisoning

Cookie poisoning is modification of a cookie by an unauthorized person to gain access and control of the data within a cookie for malicious motives like theft of bank account details, etc. 

                        5.SQL Injection 

A SQL injection attack is insertion or ―injection‖ of a malicious code (SQL query) in to user input variables, which are coupled with SQL commands and executed. The attacker then forces database to execute the harmful SQL code that could potentially ruin database tables or to retrieve valuable information from database.   

                     6.Cross Site Scripting 

Cross-site scripting attacks are security vulnerability caused due to injection of malicious HTML tags or client side scripting code into HTML form fields of a Web page. On execution, this malicious script can access cookies, session tokens, or other sensitive information retained by the Web browser or may modify the information of the Web page. 

0 Comments:

Post a Comment