11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lviii<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures“How To” ArticlesThis section contains “How To” articles, which provide step-by-step procedures forkey tasks. This section includes the following articles:● How To: Implement Patch Management● How To: Harden the TCP/IP Stack● How To: Secure Your Developer Workstation● How To: Use IPSec for Filtering Ports <strong>and</strong> Authentication● How To: Use the Microsoft Baseline <strong>Security</strong> Analyzer● How To: Use IISLockdown.exe● How To: Use URLScan● How To: Create a Custom Encryption Permission● How To: Use Code Access <strong>Security</strong> Policy to Constrain an AssemblyApproach Used in This GuideIf your goal is a hack-resilient application, how do you get there? The approach usedin this guide is as follows:● Secure your network, host, <strong>and</strong> application● Focus on threats● Follow a principle-based approachSecure Your Network, Host, <strong>and</strong> <strong>Application</strong><strong>Security</strong> must be addressed at three levels: network, host, <strong>and</strong> application. Aweakness at any layer can be exploited by an attacker. This guide takes a holisticapproach to application security <strong>and</strong> applies it at all three levels. The holisticapproach to security is shown in Figure 4.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!