11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

15Securing Your NetworkIn This Chapter●●●●OverviewSecuring your networkIdentifying network threats <strong>and</strong> describing countermeasuresShowing secure router, firewall, <strong>and</strong> switch configurationsProviding a snapshot of a secure networkThe network is the entry point to your application. It provides the first gatekeepersthat control access to the various servers in your environment. Servers are protectedwith their own operating system gatekeepers, but it is important not to allow them tobe deluged with attacks from the network layer. It is equally important to ensure thatnetwork gatekeepers cannot be replaced or reconfigured by imposters. In a nutshell,network security involves protecting network devices <strong>and</strong> the data that they forward.The basic components of a network, which act as the front-line gatekeepers, are therouter, the firewall, <strong>and</strong> the switch. Figure 15.1 shows these core components.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!