11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

320 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sNote The specifications <strong>and</strong> st<strong>and</strong>ard supported by WSE are evolving <strong>and</strong> therefore the currentWSE does not guarantee it will be compatible with future versions of the product. At the time of thiswriting, interoperability testing is under way with non-Microsoft toolkits provided by vendors includingIBM <strong>and</strong> VeriSign.How to Use This ChapterThis chapter discusses various practices <strong>and</strong> techniques to design <strong>and</strong> build secure<strong>Web</strong> services.To get the most from this chapter:● Read Chapter 19, “Securing Your ASP.NET <strong>Application</strong> <strong>and</strong> <strong>Web</strong> Services.” It isgeared toward an administrator so that an administrator can configure anASP.NET <strong>Web</strong> <strong>Application</strong> or <strong>Web</strong> service, bringing a semi-secure application toa secure state.● Read Chapter 17, “Securing Your <strong>Application</strong> Server.” Read Chapter 17 tofamiliarize yourself with remote application server considerations.● Use the “Checklist: Securing <strong>Web</strong> Services” in the “Checklists” section of thisguide. The checklist is a summary of the security measures required to build <strong>and</strong>configure secure <strong>Web</strong> services.● Use this chapter to underst<strong>and</strong> message level threats <strong>and</strong> how to counter thosethreats.● Use the application categories as a means to tackle common problems.The sections give you relevant information using these categories.<strong>Threats</strong> <strong>and</strong> CountermeasuresTo build secure <strong>Web</strong> services, know the associated threats. The top threats directed at<strong>Web</strong> services are:● Unauthorized access● Parameter manipulation● Network eavesdropping● Disclosure of configuration data● Message replay

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!