Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-

ID: 3815295 • Letter: H

Question

https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf

After reading the Word document titled "The Dangers of Hardcoded Credentials in Web cfg Files", write a post answering the following two questions. 1) This is a very widely known problem in cybersecurity, but an enormous number of websites are estimated to still be vulnerable. What do you think are the top 2 or 3 reasons that this is the case? 2) Pretend you are the manager of a large website production and management company. What 2 or 3 steps would you take to make sure that the websites your staff develops do not have this vulnerability? Please respond with your discussion post of at least 300 words

Explanation / Answer

Top vulnerabilitites that occur due to incorrect configurations on "web.config files" :

Incorrect configurations on "web.config files" leads web sites to application security holes such as
a) Session hijacking
b) Cross-Site Scripting attacks
c) Disclosure of private data to attackers.
d) In addition to this "Web.config files" were designed to be changed at any time. Any well-intentioned system admin could get hold of application security measures and open the Web site to attack just by modifying the configuration file. A single change to the "global Machine.config file" could affect the website.
e) Enabling cookieless authentication leads to session hijacking and problems with application security.
f) Another important reason for vulnerability is "failure to require SSL for authentication cookies" as web applications use the SSL protocol to encrypt data passed between the Web server and the client we must ensure that the attackers using network sniffers will not be able to interpret the exchanged data.
g) Storing login credentials in plaintext in a configuration file is not at all secure. Anyone having read access to the "Web.config file" could access the authenticated Web application and it is compromised.

Steps to prevent from vulnerabilities :

a) The most secure way to store login credentials is to remove the credentials element from "Web.config files" in production applications.
b) Reconfiguration of affected application can be done to avoid the use of weak ciphers.
c) Root user must not be able to login from a remote console because the login command is part of the authentication process to access a local account.
d) Use programs like "logcheck" and swatch to filter out the suspicious entries in the log files.
e) Disable all unessential services by using the "chkconfig off" command