11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2<strong>Threats</strong> <strong>and</strong> CountermeasuresIn This Chapter●●●●OverviewAn explanation of attacker methodologyDescriptions of common attacksHow to categorize threatsHow to identify <strong>and</strong> counter threats at the network, host, <strong>and</strong> application levelsWhen you incorporate security features into your application’s design,implementation, <strong>and</strong> deployment, it helps to have a good underst<strong>and</strong>ing of howattackers think. By thinking like attackers <strong>and</strong> being aware of their likely tactics, youcan be more effective when applying countermeasures. This chapter describes theclassic attacker methodology <strong>and</strong> profiles the anatomy of a typical attack.This chapter analyzes <strong>Web</strong> application security from the perspectives of threats,countermeasures, vulnerabilities, <strong>and</strong> attacks. The following set of core terms aredefined to avoid confusion <strong>and</strong> to ensure they are used in the correct context.● Asset. A resource of value such as the data in a database or on the file system, or asystem resource● Threat. A potential occurrence — malicious or otherwise — that may harm an asset●●●Vulnerability. A weakness that makes a threat possibleAttack (or exploit). An action taken to harm an assetCountermeasure. A safeguard that addresses a threat <strong>and</strong> mitigates risk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!