How to Use This Chapter


The following are recommendations on how to use this chapter:

  • Become familiar with specific threats that affect the network host and application . The threats are unique for the various parts of your system, although the attacker's goals may be the same.

  • Use the threats to identify risk . Then create a plan to counter those threats.

  • Apply countermeasures to address vulnerabilities . Countermeasures are summarized in this chapter. Use Part III, "Building Secure Web Applications," and Part IV, "Securing Your Network, Host, and Application," of this guide for countermeasure implementation details.

  • When you design, build, and secure new systems, keep the threats in this chapter in mind . The threats exist regardless of the platform or technologies that you use.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net