11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

416 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Advantages of a Perimeter NetworkThe perimeter network provides the following advantages:● Hosts are not directly exposed to untrusted networks.● Exposed or published services are the only point of external attack.● <strong>Security</strong> rules can be enforced for access between networks.Disadvantages of a Perimeter NetworkThe disadvantages of a perimeter network include:● Network complexity● IP address allocation <strong>and</strong> management● Requirement that the application architecture accommodate the perimeternetwork designSwitch ConsiderationsA switch is responsible for forwarding packets directly to a host or network segment,rather than sharing the data with the entire network. Therefore, traffic is not sharedbetween switched segments. This is a preventive measure against packet sniffingbetween networks. An attacker can circumvent this security by reconfiguringswitching rules using easily accessed administrative interfaces, including knownaccount names <strong>and</strong> passwords <strong>and</strong> SNMP packets.The following configuration categories are used to ensure secure switchconfiguration:● Patches <strong>and</strong> updates● Virtual Local Area Networks (VLANs)● Insecure defaults● Services● EncryptionPatches <strong>and</strong> UpdatesPatches <strong>and</strong> updates must be tested <strong>and</strong> installed as soon as they are available.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!