11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

vi<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresSolutions at a GlanceArchitecture <strong>and</strong> Design Solutions...............................................................................lxvDevelopment Solutions ............................................................................................. lxviAdministration Solutions.............................................................................................lxxFast Track — How To Implement the GuidancelxvlxxvGoal <strong>and</strong> Scope ....................................................................................................... lxxvThe Holistic Approach...............................................................................................lxxviSecuring Your Network.............................................................................................lxxviiSecuring Your Host..................................................................................................lxxviiSecuring Your <strong>Application</strong> .......................................................................................lxxviiiIdentify <strong>Threats</strong>........................................................................................................lxxixApplying the Guidance to Your Product Life Cycle ........................................................lxxxiImplementing the Guidance .....................................................................................lxxxiiWho Does What? ...................................................................................................lxxxiiiRACI Chart ........................................................................................................lxxxiiiSummary .............................................................................................................. lxxxivPart IIntroduction to <strong>Threats</strong> <strong>and</strong> Countermeasures 1Chapter 1<strong>Web</strong> <strong>Application</strong> <strong>Security</strong> Fundamentals 3We Are Secure — We Have a Firewall ............................................................................ 3What Do We Mean By <strong>Security</strong>? ................................................................................... 4The Foundations of <strong>Security</strong>..................................................................................... 4<strong>Threats</strong>, Vulnerabilities, <strong>and</strong> Attacks Defined................................................................. 5How Do You Build a Secure <strong>Web</strong> <strong>Application</strong>?................................................................ 5Secure Your Network, Host, <strong>and</strong> <strong>Application</strong> .................................................................. 6Securing Your Network................................................................................................. 7Network Component Categories ............................................................................... 7Securing Your Host...................................................................................................... 7Host Configuration Categories.................................................................................. 8Securing Your <strong>Application</strong> ............................................................................................ 9<strong>Application</strong> Vulnerability Categories .......................................................................... 9<strong>Security</strong> Principles..................................................................................................... 11Summary ................................................................................................................. 12Additional Resources ................................................................................................ 12Chapter 2<strong>Threats</strong> <strong>and</strong> Countermeasures 13In This Chapter ......................................................................................................... 13Overview .................................................................................................................. 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!