Skip to main content

Web Aplication FireWalls (WAF)

 WEB APPLICATION FIREWALLS (WAF)

What is WAF ? 

    Web application firewalls assist load balancing by examining HTTP traffic before it reaches the application server. They also protect against web application vulnerability and unauthorized transfer of data from the web server at a time when security breaches are on the rise. According the the Verizon Data Breach Investigations Report, web application attacks were the most prevalent breaches in 2017 and 2018. 
 


How do web application firewalls work ?

    Web application firewalls (WAFs) are designed to be installed on the application layer and operate as a two-way gatekeeper, analyzing HTTP/HTTPS traffic entering and exiting the application. If malicious activity is detected, the WAF will take action.WAFs have the advantage of operating independently of the application while still being able to adapt to changes in the application's behavior.As a result, adding a new feature to the app will not result in tens of thousands of false positive threat detections triggered by new data flows.  
 
 

    Although a WAF is commonly thought of as a stand-alone application, it can also be connected with other networking components. It can be installed on a dedicated physical server.WAF can be set to several levels of scrutiny, ranging from low to high, allowing the WAF to give a higher level of protection and mitigation for the web application, depending on your demands.The Payment Card Industry Data Security Standard (PCI DSS) and the Health Insurance Portability and Accountability Act of 1996 both provide regulatory guidelines for WAFs (HIPAA). 
 



Comments

Popular posts from this blog

Who is pentester ?

  Penetration Tester Overview A penetration tester is a network security expert who attempts to break into or discover potential exploits in various computer systems and software.They can be thought of as a form of ethical hacker.They are typically expected to conduct a number of tests, most of which are focused on network penetration, and then write up evaluation reports based on their findings. While they will frequently conduct pre-determined sorts of tests, they will also develop their own tests for a significant amount of the time, which demands creativity and inventiveness, as well as a high level of technical understanding and know-how.    You'd be expected to conduct formal tests on web-based apps, networks, and other sorts of computer systems on a regular basis as a penetration tester.Physical security inspections of servers, computer systems, and networks will also be expected of you.You'll be conducting regular security audits from both a logical/theoretical an...

Improve Your Web Application Security

HOW TO IMPROVE WEB APPLICATION SECURITY      Robust security measures must advance in tandem with web application technologies. Web app security threats are real and happening all over the world. To protect against emerging threats, standard measures are no longer sufficient. Fortunately, apps do not have to remain vulnerable, waiting for bad actors to abuse them. To safeguard this ever-increasing attack surface, robust security procedures and practices can be implemented. How to Improve Web Application Security  Choose a secure host Secure your login pages using SSL (HTTPS) encryption  Always sanitize and validate user input Have a good password policy  Limit access rights and credentials Keep your website clean Ensure everything is up to date Keep regular backups Make sure to tweak the default settings of your CMS Run security tests on your website for vulnerabilities             Sometimes the most straightforward approa...

What is web application ?

WEB APPLICATION  What is WEB APPLICATION ? In today’s world, the usage of web applications growing day by day. The professionals of software area like Software Developer and Software Testers need to have familiar with Web Applications. It is a client-server application program, stored on a remote server that uses web browsers and web technology to perform specific function over the Internet through a browser interface. As said above, It is a client-server application program, therefore in the client-server environment, multiple computers can share information like saving the information into a database. The “client” can be used to enter the information, and the ‘server’ is used as storage for the information.   How do web applications work? A typical web application workflow looks like the following:   A user submits a request to a web server over the internet, either through a web browser or through an app's user interface. The webserver send...