11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xxxixHow ToIndex 743How ToImplement Patch Management 745Applies To .............................................................................................................. 745Summary ............................................................................................................... 745What You Must Know .............................................................................................. 745The Patch Management Process .......................................................................... 745The Role of MBSA in Patch Management .............................................................. 746Backups <strong>and</strong> Patch Management ......................................................................... 746Before You Begin .................................................................................................... 747Tools You Will Need............................................................................................. 747Contents ................................................................................................................ 747Detecting ............................................................................................................... 748MBSA Output Explained....................................................................................... 749Assessing .............................................................................................................. 751Acquiring ................................................................................................................ 751Testing ................................................................................................................... 752Methods for Testing <strong>Security</strong> Patches ................................................................... 752Confirming the Installation of a Patch ................................................................... 752Uninstalling a <strong>Security</strong> Patch................................................................................ 752Deploying ............................................................................................................... 753Using Software Update Services (SUS) ................................................................. 753Using Systems Management Server (SMS) ........................................................... 753Maintaining ............................................................................................................ 753Performing <strong>Security</strong> Assessments ........................................................................ 753Using <strong>Security</strong> Notification Services ..................................................................... 754Additional Considerations ........................................................................................ 754Additional Resources .............................................................................................. 754How ToHarden the TCP/IP Stack 755Applies To .............................................................................................................. 755Summary ............................................................................................................... 755What You Must Know .............................................................................................. 755Contents ................................................................................................................ 756Protect Against SYN Attacks .................................................................................... 756Enable SYN Attack Protection .............................................................................. 756Set SYN Protection Thresholds ............................................................................ 757Set Additional Protections.................................................................................... 757Protect Against ICMP Attacks................................................................................... 759Protect Against SNMP Attacks.................................................................................. 759

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!