11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

146 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sHow to Use This ChapterThe following are recommendations on how to use this chapter:● Use this chapter in conjunction with Chapter 8, “Code Access <strong>Security</strong> inPractice.” Chapter 8 shows you how to use code access security features to furtherimprove the security of your assemblies.● Use the corresponding checklist. For a summary checklist that summarizes thebest practices <strong>and</strong> recommendations for both chapters, see “Checklist: <strong>Security</strong>Review for Managed Code” in the Checklists section of this guide.<strong>Threats</strong> <strong>and</strong> CountermeasuresUnderst<strong>and</strong>ing threats <strong>and</strong> the common types of attack helps you to identifyappropriate countermeasures <strong>and</strong> allows you to build more secure <strong>and</strong> robustassemblies. The main threats are:● Unauthorized access or privilege elevation, or both●●●Code injectionInformation disclosureTamperingFigure 7.1 illustrates these top threats.UnauthorizedAccessLuring attacksTrusted CallingAssemblyInformationDisclosureExceptions,secrets in codeTamperingMSIL attacks,reverseengineeringAssemblyCode InjectionBuffer overflows,untrusteddelegatesUnauthorizedAccessFigure 7.1Assembly-level threats

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!