What is Vulnerability? Is your software secured enough?

Vulnerability Cyber attack

Vulnerability Cyber attack

Www.Koverstory.com

Vulnerability is one of the common problems of software industry. There are high raise in Cyber attacks , today we’ll learn about the them. In terms of Software development we define it as Vulnerabilities.

None of the software if prefect in terms of security. Your software uses many jars files , a lots of codes we can try our best to make but some where we miss or uses some some jars which have certain piece of code where attackers can gain access. It might be any things Issue with java scripts where we might have shown critical info like password , account no or any other which is enough for attackers to gain access.

the other example is if you ae using any third party jars and it might have some code which directly exposing or leaking data on UI console or in logs. The jars which you are using today is secure but over the period of time jar gets old and attacker find the way to exploit it and gain access on your software.

Top Vulnerabilities of 2023

Another example is once you develop you application or API , Unwillingly you might expose such attributes which are critical and not secured enough from you code.

Categories of  vulnerabilities 

System Misconfigurations – As we are increasing in developing new technologies we are missing out out secure network configurations. Network connections are the most frequent security brakeage. Most of the Cyber crimes happens through unsecure network connections. So while developing application we should consider the secure connections always with reviewing with Cyber security experts.

System misconfiguration vulnerability

Out-of-date or Unpatched Software  – Like i mentioned above about jars. Once you used the jars and after certain period of time it get old and by that time Cyber attackers finds the way to exploits it and gain the access of you software’s.

out of date or unprotected uses of software

Missing or Weak Authorization Credentials – The is simplest ways to make cyber crime. You kept your password simple so that you can remember it but this simple passwords are easy accessible for the cyber attackers. That is the reason most of the sites ask to keep a password which have special char, number etc. Keep you password as much as complex and can be remembered.

Weak password

Malicious Insider Threats – Sometimes the employee who have access the internal systems share some data which are highly secured. After these data can by anything like network information, secure IP connections or etc. can cause the cyber attack.

Malicious Insider Threats

Missing or Poor Data Encryption – Encryption is one of the layer of security on you data which is shared or transmitted over the network. There are a lot of ways to encrypt your data which can be used. For example – Once you login in your Banking app after you enter Username and password you get the screen where you all the detail like balance , address etc. these data are stored somewhere on Banking side but once you enter details they use to transfer your all the data from their server to your mobile or where you logged in. so while sending the data they should use secured encryption way to protect your users data.

Missing or Poor Data Encryption

Zero-day Vulnerabilities – These are Vulnerabilities which are not known by the software development teams but cyber attackers have identified and able to inject malicious code in your application.

Zero day exploit

Life Cycle of Vulnerabilities

In this section we’ll know about how we detect , identify the type , fixing it and migrating the vulnerability.

Vulnerability life cycle

1- Detection of Vulnerability

Detection of Vulnerability can be done with multiple methods

  1. Scanning :- Once you develop you software you can use some of the already available tools like – SolarWinds Network Configuration Manager (NCM), Manage Engine Vulnerability Manager Plus, Rapid7 Nexpose, TripWire IP 360, and others are some common vulnerability detection solutions. These tools are helpful to identify the vulnerability.
  2. Penetration Testing :- Most of the software companies have their penetration testing team. This testing can be manual or automated. They will take your software and run their automated testing script. Once testing is completed they use to generate a report which have all the vulnerabilities listed. Now developer need to go through it and fix each.
  3. Google Hacking : – Is also known as Google dorking and it’s used to collection the information by attackers. it uses a search engine to identify the vulnerabilities.
  4. Review while writing code :- This not a technique rather than a good software lifecycle development approach. While developing software’s you can get your code reviewed by senior members of the team and they can help to identify the vulnerability and you can fix it wile development phase of software itself.

2- Prioritize your Vulnerability :-

Once you identified your Vulnerability this is the next step where you need to define the level of risk , there might be the changes you find a lot of vulnerabilities based on the criticality of each you can prioritize and fix the critical one first and so on.

3- Fixing/ Addressing Vulnerability :-

Once you identified and prioritize the vulnerability now you need to fix this. There are different ways you can address them, let’s discuss about it –

At the end of 2021 we got an critical vulnerability which was impacting almost all the organizations all over the world.it was CVE-2021-44228 — Vulnerability in Apache Log4j Library.

How to setup java 20?

 

 

 

 

Exit mobile version