11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 3: Threat Modeling 49ArchitectureDiagrams <strong>and</strong>DefinitionsThreat #1Identified<strong>Threats</strong> <strong>and</strong>ThreatAttributesThreat #2Threat #3Threat #nFigure 3.2Components of the threat modelStep 1. Identify AssetsIdentify the assets that you need to protect. This could range from confidential data,such as your customer or orders database, to your <strong>Web</strong> pages or <strong>Web</strong> site availability.Step 2. Create an Architecture OverviewAt this stage, the goal is to document the function of your application, its architecture<strong>and</strong> physical deployment configuration, <strong>and</strong> the technologies that form part of yoursolution. You should be looking for potential vulnerabilities in the design orimplementation of the application.During this step, you perform the following tasks:● Identify what the application does.●●Create an architecture diagram.Identify the technologies.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!