11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

142 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sSystem.<strong>Security</strong>.PolicyThis namespace contains types that are used to implement the code access securitypolicy system. It includes types to represent code groups, membership conditions,policy levels, <strong>and</strong> evidence.System.<strong>Security</strong>.PermissionsThis namespace contains the majority of permission types that are used toencapsulate the rights of code to access resources <strong>and</strong> perform privileged operations.The following table shows the permission types that are defined in this namespace(in alphabetical order).Table 6.2 Permission Types Within the System.<strong>Security</strong>.Permissions NamespacePermissionDirectoryServicesPermissionDescriptionRequired to access Active Directory.DNSPermissionEndpointPermissionEnvironmentPermissionEventLogPermissionFileDialogPermissionFileIOPermissionIsolatedStorageFilePermissionIsolatedStoragePermissionMessageQueuePermissionOdbcPermissionRequired to access domain name system (DNS) servers on thenetwork.Defines an endpoint that is authorized by a SocketPermissionobject.Controls read <strong>and</strong> write access to individual environmentvariables. It can also be used to restrict all access toenvironment variables.Required to access the event log.Allows read-only access to files only if the file name is specifiedby the interactive user through a system-provided file dialog box.It is normally used when FileIOPermission is not granted.Controls read, write, <strong>and</strong> append access to files <strong>and</strong> directorytrees. It can also be used to restrict all access to the filesystem.Controls the usage of an application’s private virtual file system(provided by isolated storage). Isolated storage creates a unique<strong>and</strong> private storage area for the sole use by an application orcomponent.Required to access isolated storage.Required to access Microsoft Message Queuing messagequeues.Required to use the ADO.NET ODBC data provider. (Full trust isalso required.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!