11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresSecure Your Network, Host, <strong>and</strong> <strong>Application</strong>“A vulnerability in a network will allow a malicious user to exploit a host or an application.A vulnerability in a host will allow a malicious user to exploit a network or an application.A vulnerability in an application will allow a malicious user to exploit a network or a host.”— Carlos Lyons, Corporate <strong>Security</strong>, MicrosoftTo build secure <strong>Web</strong> applications, a holistic approach to application security isrequired <strong>and</strong> security must be applied at all three layers. This approach is shown inFigure 1.1.Secure the NetworkSecure the HostSecure the <strong>Application</strong>PresentationLogicBusinessLogicData AccessLogicRuntime Services <strong>and</strong> ComponentsPlatform Services <strong>and</strong> ComponentsOperating SystemFigure 1.1A holistic approach to security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!