<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andrew+smart</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andrew+smart"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Andrew_smart"/>
		<updated>2026-05-06T12:55:44Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Definition_for_common_business_applications&amp;diff=130777</id>
		<title>Definition for common business applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Definition_for_common_business_applications&amp;diff=130777"/>
				<updated>2012-05-31T12:09:16Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew smart: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Applications can be categorized by the business functionality from an enterprise perspective and it can also be categorized based on how and where they run. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Application categorization based on the business functionality ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Business to Customer(B2C) Applications'''&lt;br /&gt;
These are in general customer facing applications. Most of these are web/browser based applications. It includes dynamic content based web sites. Some of these applications can be client based application that needs to be installed on customer's computing device (laptop/desktop).&lt;br /&gt;
&lt;br /&gt;
Examples &lt;br /&gt;
* Ordering System&lt;br /&gt;
* Customer Support System&lt;br /&gt;
* Web sites providing product information&lt;br /&gt;
* Applets/Active-X lightweight clients &lt;br /&gt;
* Clients that gets installed on customer devices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Business to Business (B2B) Applications'''&lt;br /&gt;
These applications are used between business partners like suppliers, resellers etc. Traditionally these applications are accessed using dedicated lines between business partners. Lately many of these applications directly use Internet with security features such as VPNs. Many of these applications are based on SOA (Service oriented architecture) and leverage web-services.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* Parts ordering and status system&lt;br /&gt;
* Bulk Order submission web service&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Internal Applications'''&lt;br /&gt;
These applications are used within the organization (Intranet) and are not exposed/available outside the enterprise. These include web based applications as well as desktop applications such as email/IM.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* HR Systems&lt;br /&gt;
* Internal Financial and ERP System&lt;br /&gt;
* IT Desktop support system&lt;br /&gt;
* Email clients&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Application categorization based on on how and where they run ==&lt;br /&gt;
&lt;br /&gt;
'''Front-End Applications'''&lt;br /&gt;
These are the applications that interact with users through GUI such as browser, desktop client etc.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* Order status checking system&lt;br /&gt;
* Email clients&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Background Applications'''&lt;br /&gt;
These applications does not directly interact with the user. These are typically background processes and jobs.&lt;br /&gt;
&lt;br /&gt;
Examples&lt;br /&gt;
* Background Order validation Job&lt;br /&gt;
* Nightly data Synchronization scripts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Services based Applications/Interfaces'''&lt;br /&gt;
Provides an integration point to other applications and systems. Web Services is widely used standard. &lt;br /&gt;
&lt;br /&gt;
Examples&lt;br /&gt;
* customer data retrieval web service&lt;br /&gt;
* Google's SOAP Search API &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
== External Resources ==&lt;br /&gt;
'''[http://www.bizplancorner.com/ Business Plan Writer] | [http://www.bizplancorner.com/articles/22/business-plan-writers.aspx Business Plan Writers] | [http://www.bizplancorner.com/articles/1/business_plan_writing_service.aspx Business Plan Writing Service] | [http://www.bizplancorner.com/articles/24/business-plan-service.aspx Business Plan Service]'''&lt;/div&gt;</summary>
		<author><name>Andrew smart</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Business_Justification_for_Application_Security_Assessment&amp;diff=130776</id>
		<title>Business Justification for Application Security Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Business_Justification_for_Application_Security_Assessment&amp;diff=130776"/>
				<updated>2012-05-31T12:08:48Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew smart: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today's enterprise and the end users have increasingly become dependent on IT applications. IT Applications (most of them are web based) allow customers/users to directly access personal and confidential information, encouraging self-driven model, decreasing business cost. Critical business functions are dependent successful functioning of the IT applications e.g. enterprise such as eBay, Amazon.com has most of their business dependent on their Internet facing flagship applications. &lt;br /&gt;
&lt;br /&gt;
There is exponential increase in vulnerabilities found in Web Applications putting significant financial impact to the enterprise and privacy of the end users. Gartner's recent studies[1] shows that hackers are moving towards web application based attacks, 75% of total attacks now occur on Web applications. Systems and network administrators in last 5-10 years (end 1990s to early 00s) have achieved significant maturity on controlling OS and network level attacks. Strong OS hardening/patching procedures coupled with well managed firewalls provides sufficient surety to the business that these layers are secure and not easy to penetrate. &lt;br /&gt;
&lt;br /&gt;
This is yet not true for applications, especially web applications. Web applications provide a logical tunnel from outside/Internet to the backend databases inside the enterprise. Web applications are complex piece of code with a mix of customized business logic, third party libraries, back-end database routines and integration to multiple other applications. Complexity increases potential points of failures. A recent study by penetration testers [2] shows that more than 95% of web applications have some sort of vulnerability. &lt;br /&gt;
&lt;br /&gt;
== What pressures business is coming under?== &lt;br /&gt;
&lt;br /&gt;
'''Compliance and Regulatory Needs'''&lt;br /&gt;
&lt;br /&gt;
Sarbanes-Oxley for financial accounting, HIPAA for safe handling of medical records, Gramm-Leach-Bliley for privacy of customer and PCI to safely process and handle credit card information. List is endless. Achieving compliance to regulations imposed by government and industry is one of the top priorities for business. Compliance entails having strong security controls in your IT applications and associated processes. Security assessment helps to check compliances and in some case required.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Increasing Cost of Security Breaches'''&lt;br /&gt;
&lt;br /&gt;
Cost of security breaches is increasing. It is not only loosing the customer confidence but enterprise may end up paying heavy penalties. Payment Card Industry (PCI) recently announced $50,000 fine per incident if cardholder data is compromised. ChoicePoint, lost information of 145,000 customers in 2005 and ended up spending $11.4 million in related cost. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Awareness of Users'''&lt;br /&gt;
&lt;br /&gt;
Users have become much more aware and attentive towards the privacy, confidentiality and safekeeping of their personal information. Media has helped to create awareness. Comments like &amp;quot;.. I refused to enter my credit card information as I don't see the padlock [SSL] at bottom of my browser window...&amp;quot; are common.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What is there to lose''' &lt;br /&gt;
&lt;br /&gt;
Ultimate question for business may be what is there to lose.&lt;br /&gt;
&lt;br /&gt;
* Data, which may be the biggest asset in the enterprise&lt;br /&gt;
* Public Image and Confidence of Customers&lt;br /&gt;
* Availability of applications causing unplanned blackouts for business &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We have talked about what are potential business impacts due to insecure applications. Application Security Assessment helps to figure out what are the weaknesses and potential issues in our web application. Helps business spend the security dollars where it is most required. And way to consistently keep our applications one notch higher than the attackers.&lt;br /&gt;
&lt;br /&gt;
== References== &lt;br /&gt;
&lt;br /&gt;
[1]. Gartner, Nov 2005 &amp;lt;http://gartner.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[2]. Studies from numerous penetration tests by Imperva &amp;lt;http://www.imperva.com/application_defense_center/papers/how_safe_is_it.html&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
{{Template:Control}}&lt;br /&gt;
[[Category: Control]]&lt;br /&gt;
&lt;br /&gt;
== External Resources ==&lt;br /&gt;
'''[http://www.bizplancorner.com/ Business Plan Writer] | [http://www.bizplancorner.com/articles/22/business-plan-writers.aspx Business Plan Writers] | [http://www.bizplancorner.com/articles/1/business_plan_writing_service.aspx Business Plan Writing Service] | [http://www.bizplancorner.com/articles/24/business-plan-service.aspx Business Plan Service]'''&lt;/div&gt;</summary>
		<author><name>Andrew smart</name></author>	</entry>

	</feed>