11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

xxxiv<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresRemoting ............................................................................................................... 668Port Considerations ............................................................................................ 668Hosting in ASP.NET with the HttpChannel ............................................................. 669Hosting in a Custom Process with the TcpChannel ................................................ 670Database Server Configuration ................................................................................ 670Patches <strong>and</strong> Updates .......................................................................................... 671Services............................................................................................................. 671Protocols............................................................................................................ 671Accounts............................................................................................................ 672Files <strong>and</strong> Directories ........................................................................................... 673Shares............................................................................................................... 673Ports.................................................................................................................. 674Registry ............................................................................................................. 674Auditing <strong>and</strong> Logging ........................................................................................... 675SQL Server <strong>Security</strong> ............................................................................................ 675SQL Server Logins, Users, <strong>and</strong> Roles.................................................................... 676SQL Server Database Objects.............................................................................. 677Network Configuration ............................................................................................. 677Router................................................................................................................ 678Firewall .............................................................................................................. 679Switch................................................................................................................ 679Summary ............................................................................................................... 680Related <strong>Security</strong> Resources 681Related Microsoft patterns & practices Guidance ...................................................... 681<strong>Security</strong>-Related <strong>Web</strong> Sites ...................................................................................... 681Microsoft <strong>Security</strong>-Related <strong>Web</strong> Sites ................................................................... 681Third-Party, <strong>Security</strong>-Related <strong>Web</strong> Sites ................................................................. 682Microsoft <strong>Security</strong> Services ..................................................................................... 682Partners <strong>and</strong> Service Providers ................................................................................ 682Communities <strong>and</strong> Newsgroups................................................................................. 683Newsgroup Home Pages...................................................................................... 683Patches <strong>and</strong> Updates .............................................................................................. 683Service Packs..................................................................................................... 683Alerts <strong>and</strong> Notification............................................................................................. 684Microsoft <strong>Security</strong> Notification Services ................................................................ 684Third Party <strong>Security</strong> Notification Services .............................................................. 684Additional Resources .............................................................................................. 684Checklists <strong>and</strong> Assessment Guidelines ................................................................ 684Common Criteria................................................................................................. 685Reference Hub.................................................................................................... 685<strong>Security</strong> Knowledge in Practice............................................................................. 685Vulnerabilities..................................................................................................... 685World Wide <strong>Web</strong> <strong>Security</strong> FAQ............................................................................... 685

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!