11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lx<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresFollow a Principle-Based ApproachRecommendations used throughout this guide are based on security principles thathave proven themselves over time. The analysis <strong>and</strong> consideration of threats priorto product implementation or deployment lends itself to a principle-based approachwhere core principles can be applied, regardless of implementation technology orapplication scenario.Positioning of This GuideThis is Volume II in a series dedicated to helping customers plan, build, deploy, <strong>and</strong>operate secure <strong>Web</strong> applications: Volume I, Building Secure ASP.NET <strong>Application</strong>s:Authentication, Authorization, <strong>and</strong> Secure Communication, <strong>and</strong> Volume II, <strong>Improving</strong> <strong>Web</strong><strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures.Volume I, Building Secure ASP.NET <strong>Application</strong>sBuilding Secure ASP.NET <strong>Application</strong>s helps you to build a robust authentication <strong>and</strong>authorization mechanism for your application. It focuses on identity managementthrough the tiers of a distributed <strong>Web</strong> application. By developing a solidauthentication <strong>and</strong> authorization strategy early in the design, you can eliminate ahigh percentage of application security issues. The primary audience for Volume Iis architects <strong>and</strong> lead developers.Figure 5 shows the scope of Volume I. The guide addresses authentication,authorization, <strong>and</strong> secure communication across the tiers of a distributed <strong>Web</strong>application. The technologies that are covered are the same as the current guide <strong>and</strong>include Windows 2000 Server, IIS, ASP.NET <strong>Web</strong> applications <strong>and</strong> <strong>Web</strong> services,Enterprise Services, .NET Remoting, SQL Server, <strong>and</strong> ADO.NET.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!