11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introduction lixSecure the NetworkSecure the HostSecure the <strong>Application</strong>PresentationLogicBusinessLogicData AccessLogicRuntime Services <strong>and</strong> ComponentsPlatform Services <strong>and</strong> ComponentsOperating SystemFigure 4A holistic approach to securityFigure 4 shows the multiple layers covered by the guide, including the network,host, <strong>and</strong> application. The host layer covers the operating system, platform services<strong>and</strong> components, <strong>and</strong> run-time services <strong>and</strong> components. Platform services <strong>and</strong>components include SQL Server <strong>and</strong> Enterprise Services. Run-time services <strong>and</strong>components include ASP.NET <strong>and</strong> .NET code access security among others.Focus on <strong>Threats</strong>Your application’s security measures can become useless, or even counter productive,if those measures are applied without knowing the threats that the security measuresare designed to mitigate.<strong>Threats</strong> can be external, such as attacker on the Internet, or internal, for example, adisgruntled employee or administrator. This guide helps you identify threats in twoways:● It enumerates the top threats that affect <strong>Web</strong> applications at the network, host, <strong>and</strong>application levels.● It helps you to identify which threats are relevant to your application througha process called threat modeling.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!