11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

426 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Viruses, Worms, <strong>and</strong> Trojan HorsesMalicious code comes in several varieties, including:● Viruses. Programs that are designed to perform malicious acts <strong>and</strong> causedisruption to an operating system or applications.● Worms. Programs that are self-replicating <strong>and</strong> self-sustaining.●Trojan horses. Programs that appear to be useful but that actually do damage.In many cases, malicious code is unnoticed until it consumes system resources <strong>and</strong>slows down or halts the execution of other programs. For example, the Code Redworm was one of the most notorious to afflict IIS, <strong>and</strong> it relied upon a buffer overflowvulnerability in an ISAPI filter.VulnerabilitiesCommon vulnerabilities that make you susceptible to viruses, worms, <strong>and</strong> Trojanhorses include:● Unpatched servers● Running unnecessary services● Unnecessary ISAPI filters <strong>and</strong> extensionsCountermeasuresCountermeasures include the prompt application of the latest software patches,disabling unused functionality such as unused ISAPI filters <strong>and</strong> extensions, <strong>and</strong>running processes with least privileged accounts to reduce the scope of damage inthe event of a compromise.Methodology for Securing Your <strong>Web</strong> ServerTo secure a <strong>Web</strong> server, you must apply many configuration settings to reduce theserver’s vulnerability to attack. So, how do you know where to start, <strong>and</strong> when doyou know that you are done? The best approach is to organize the precautions youmust take <strong>and</strong> the settings you must configure, into categories. Using categoriesallows you to systematically walk through the securing process from top to bottom orpick a particular category <strong>and</strong> complete specific steps.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!