28.12.2013 Views

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1<br />

Introduction<br />

<strong>Building</strong> secure distributed Web applications is challenging. Your application is<br />

only as secure as its weakest link. With distributed applications, you have a lot of<br />

moving parts and making those parts work together in a secure fashion requires<br />

a working knowledge that spans products and technologies.<br />

You already have a lot to consider; integrating various technologies, staying current<br />

with technology, and keeping a step ahead of the competition. If you don’t already<br />

know how to build secure applications, can you afford the time and effort to learn?<br />

More to the point, can you afford not to?<br />

The Connected Landscape<br />

If you already know how to build secure applications, are you able to apply what<br />

you know when you build .<strong>NET</strong> Web applications? Are you able to apply your<br />

knowledge in today’s landscape of Web-based distributed applications, where Web<br />

services connect businesses to other business and business to customers and where<br />

applications offer various degrees of exposure; for example, to users on intranets,<br />

extranets, and the Internet?<br />

Consider some of the fundamental characteristics of this connected landscape:<br />

● Web services use standards such as SOAP, Extensible Markup Language (XML),<br />

and Hypertext Transport Protocol (HTTP), but fundamentally they pass potentially<br />

sensitive information using plain text.<br />

● Internet business-to-consumer applications pass sensitive data over the Web.<br />

● Extranet business-to-business applications blur the lines of trust and allow<br />

applications to be called by other applications in partner companies.<br />

● Intranet applications are not without their risks considering the sensitive nature<br />

of payroll and Human Resource (HR) applications. Such applications are particularly<br />

vulnerable to rogue administrators and disgruntled employees.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!