11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

404 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>FilteringPort BlockingIDSFilteringPort BlockingIDSIsolates TrafficFiltering<strong>Web</strong> ServerDatabaseServerInternetRouterSwitchDataStoreFirewallFigure 15.1Network components: router, firewall, <strong>and</strong> switchHow to Use This ChapterThis chapter provides a methodology <strong>and</strong> steps for securing a network. Themethodology can be adapted for your own scenario. The steps put the methodologyinto practice.To get most out of this chapter:● Read Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures.” This will give you a betterunderst<strong>and</strong>ing of potential threats to <strong>Web</strong> applications.● Use the snapshot. Table 15.3, which is at the end of this chapter, provides asnapshot of a secure network. Use this table as a reference when configuring yournetwork.● Use the Checklist. Use “Checklist: Securing Your Network” in the “Checklist”section of this guide, to quickly evaluate <strong>and</strong> scope the required steps. Thechecklist will also help you complete the individual steps.● Use vendor details to implement the guidance. The guidance in this chapter isnot specific to specific network hardware or software vendors. Consult yourvendor’s documentation for specific instructions on how to implement thecountermeasures given in this chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!