How to Use This Chapter


This chapter provides a methodology and steps for securing a network. The methodology can be adapted for your own scenario. The steps put the methodology into practice.

To get most out of this chapter:

  • Read Chapter 2, "Threats and Countermeasures." This will give you a better understanding of potential threats to Web applications.

  • Use the snapshot . Table 15.3, which is at the end of this chapter, provides a snapshot of a secure network. Use this table as a reference when configuring your network.

  • Use the Checklist . Use "Checklist: Securing Your Network" in the "Checklist" section of this guide, to quickly evaluate and scope the required steps. The checklist will also help you complete the individual steps.

  • Use vendor details to implement the guidance . The guidance in this chapter is not specific to specific network hardware or software vendors . Consult your vendor's documentation for specific instructions on how to implement the countermeasures given in this chapter.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net