Attacker attacks the victim throw vulnerabilities to cause threats, so:
Threat is any potential occurrence, malicious or otherwise, that could harm an asset. In other words, a threat is any bad thing that can happen to your assets.
Vulnerability is a weakness that makes a threat possible.
Attack is an action that exploits a vulnerability or enacts a threat.
Asset: A resource of value such as the data in a database or on the file system, or a system resource
Countermeasure. A safeguard that addresses a threat and mitigates risk
The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security. One of OWASP’s core principles is that all of their materials be freely available and easily accessible on their website, making it possible for anyone to improve their own web application security. The materials they offer include documentation, tools, videos, and forums. Perhaps their best-known project is the OWASP Top 10.
This section is to determine how security requirements can be detected.
As we mention in the opposite graph:
Generate abuse cases from Use cases
Risk assessment
Risk based security test
Penetration testing
Feedback
The OWASP Top 10 is a regularly-updated report outlining security concerns for web application security, focusing on the 10 most critical risks. The report is put together by a team of security experts from all over the world. OWASP refers to the Top 10 as an ‘awareness document’ and they recommend that all companies incorporate the report into their processes in order to minimize and/or mitigate security risks.
Injection
Broken Authentication
XXE: XML External entities
Sensitive data exposure
Security Misconfiguration
In-Secure deserialization
Broken Access control
Cross-site scripting
Insufficient Logging and monitoring
Using components with known vulnerabilities
Mission Critical Assets
Data Security
Application Security
End point Security
Network Security
Perimeter Security
Human Layer
Fixation : It’s an attack that hacker can steal your session ID and use it in executing http requests
XSS : Cross site scripting
CSRF: Cross-Site Request forgery is an attack where a malicious site sends a request to a vulnerable site where the user is currently logged in.
Hijacking : To steal something from the client or the server
Brute-Force: Attacker trying many passwords or passphrases with the hope of eventually guessing correctly. Can be resolved by delaying the repetitive trials and block the incoming IPs from IIS
Tampering: Means attacker trails for changing the parameters values in order to do something
Sniffing : It’s the act of monitoring traffic on the network for data such as plaintext passwords or configuration information. With a simple packet sniffer, an attacker can easily read all plaintext traffic. Also, attackers can crack packets encrypted by lightweight hashing algorithms and can decipher the payload that you considered to be safe. The sniffing of packets requires a packet sniffer in the path of the server/client communication. SSL is the key countermeasure. The attacker place packet-sniffing tool on the network to monitor the traffic.
SonarQube
Invicti
Acunetix
Front End Security
Communication Security
Backend Security
Database Security
Infrastructure security