11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

14 Part I: Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresThis chapter also identifies a set of common network, host, <strong>and</strong> application levelthreats, <strong>and</strong> the recommended countermeasures to address each one. The chapterdoes not contain an exhaustive list of threats, but it does highlight many top threats.With this information <strong>and</strong> knowledge of how an attacker works, you will be able toidentify additional threats. You need to know the threats that are most likely toimpact your system to be able to build effective threat models. These threat modelsare the subject of Chapter 3, “Threat Modeling.”How to Use This ChapterThe following are recommendations on how to use this chapter:● Become familiar with specific threats that affect the network host <strong>and</strong>application. The threats are unique for the various parts of your system, althoughthe attacker’s goals may be the same.● Use the threats to identify risk. Then create a plan to counter those threats.●●Apply countermeasures to address vulnerabilities. Countermeasures aresummarized in this chapter. Use Part III, “Building Secure <strong>Web</strong> <strong>Application</strong>s,” <strong>and</strong>Part IV, “Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>,” of this guide forcountermeasure implementation details.When you design, build, <strong>and</strong> secure new systems, keep the threats in thischapter in mind. The threats exist regardless of the platform or technologies thatyou use.Anatomy of an AttackBy underst<strong>and</strong>ing the basic approach used by attackers to target your <strong>Web</strong>application, you will be better equipped to take defensive measures because you willknow what you are up against. The basic steps in attacker methodology aresummarized below <strong>and</strong> illustrated in Figure 2.1:● Survey <strong>and</strong> assess● Exploit <strong>and</strong> penetrate● Escalate privileges● Maintain access● Deny service

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!