13.09.2016 Views

PHP and MySQL Web Development 4th Ed-tqw-_darksiderg

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer <strong>and</strong> Operating System Security<br />

387<br />

DMZs have two major advantages:<br />

n<br />

n<br />

They protect our servers <strong>and</strong> web applications from internal attacks as well as<br />

external attacks.<br />

They protect our internal networks even further by putting more layers of firewalls<br />

<strong>and</strong> security between our corporate network <strong>and</strong> the Internet.<br />

The design, installation, <strong>and</strong> maintenance of a DMZ is something that should be coordinated<br />

with the network administrators for the location where you will be hosting your<br />

web application.<br />

Prepare for DoS <strong>and</strong> DDoS Attacks<br />

One of the more frightening attacks seen today is the denial of service (DoS) attack,<br />

which we mentioned in Chapter 15. Network DOS attacks <strong>and</strong> the even more alarming<br />

distributed denial of service (DDoS) attacks use hijacked computers, worms, or other<br />

devices to exploit weaknesses in software installations, or even those inherent within the<br />

design of protocols such as TCP/IP themselves to swamp a computer <strong>and</strong> prevent it<br />

from replying to any connection requests from legitimate clients.<br />

Unfortunately, this type of attack is very difficult to prevent <strong>and</strong> respond to. Some<br />

network appliance vendors sell equipment to help mitigate the risks <strong>and</strong> effects of DoS<br />

attacks, but there are no comprehensive solutions against them yet.<br />

Your network administrator, at the very least, should do some research to underst<strong>and</strong><br />

the nature of the problem <strong>and</strong> the risks that your particular network <strong>and</strong> installations<br />

face.This, in combination with discussions with your ISP (or whomever will be hosting<br />

the machines running your ISP) will help prepare you for the eventuality when such an<br />

attack does occur. Even if the attack is not directed specifically at your servers, they may<br />

end up being victims nonetheless.<br />

Computer <strong>and</strong> Operating System Security<br />

The last thing we will worry about protecting is the server computer on which the web<br />

application runs.There are a few key ways in which you can <strong>and</strong> should do this.<br />

Keep the Operating System Up-to-Date<br />

One of the easier ways to keep your computer safe is to keep the operating system software<br />

up-to-date as much as possible. As soon as you choose a particular operating system<br />

for your production environment, you should set into motion a plan for performing<br />

upgrades <strong>and</strong> applying security patches to that operating system.You should also have<br />

somebody periodically go <strong>and</strong> check certain sources looking for new alerts, patches, or<br />

updates.<br />

Where exactly you find out about vulnerabilities depends exactly on the operating<br />

system software you are using.Typically, this can be done from the vendor from which

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!