11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

408 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Attacks●●●●Common denial of service attacks include:Brute force packet floods, such as cascading broadcast attacksSYN flood attacksService exploits, such as buffer overflowsCountermeasuresCountermeasures include:●●●Filtering broadcast requestsFiltering Internet Control Message Protocol (ICMP) requestsPatching <strong>and</strong> updating of service softwareMethodology<strong>Security</strong> begins with an underst<strong>and</strong>ing of how the system or network that needs to besecured works. This chapter breaks down network security by devices, which allowsyou to focus on single points of configuration.In keeping with this guide’s philosophy, this chapter uses the approach of analyzingpotential threats; without these analyses, it’s impossible to properly apply security.The network infrastructure can be broken into the following three layers: access,distribution, <strong>and</strong> core. These layers contain all of the hardware necessary to controlaccess to <strong>and</strong> from internal <strong>and</strong> external resources. The chapter focuses on thesoftware that drives the network hardware that is responsible for delivering ASP.NETapplications. The recommendations apply to an Internet or intranet-facing <strong>Web</strong> zone<strong>and</strong> therefore might not apply to your internal or corporate network.The following are the core network components:● Router● Firewall● SwitchRouterThe router is the outermost security gate. It is responsible for forwarding IP packetsto the networks to which it is connected. These packets can be inbound requests fromInternet clients to your <strong>Web</strong> server, request responses, or outgoing requests frominternal clients. The router should be used to block unauthorized or undesired trafficbetween networks. The router itself must also be secured against reconfiguration byusing secure administration interfaces <strong>and</strong> ensuring that it has the latest softwarepatches <strong>and</strong> updates applied.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!