Index_I


I

ICMP
common messages, 410
protecting against attacks, 759
screening from the internal network, 410411
IDC, 302
identifier exchange, 118
identity, 594599
<identity> element
ASP.NET application and Web services, 558559
encrypting credentials for, 559
impersonation, 286
Web server configuration, 660
identity flow, 96
identity obfuscation. See spoofing
identity objects
per authentication type, 134
role-based security, 134
identity permissions, 184
identity (run as), 493
identity spoofing
described, 257
Web pages and controls, 257258
<identity username = password= />, 546
IDisposable, 617
IDS. See Intrusion Detection Systems
IIS 5, ASP.NET architecture on Windows 2000, 591
IIS 6
allow IIS to control password option, 597
ASP.NET architecture on Windows 2000, 592593
IIS
anonymous account, 446447
to configure virtual directory, 332
developer workstations, 770771
file extensions, 457
hosting, 486487
installation defaults, 430
installed on an NTFS volume, 648
log files, 452
metabase, 429, 460, 656
metabase checklists, 727
metabase vulnerabilities, 429
and .NET framework installation considerations, 430432
for programmatic impersonation, 286287
securing for developer workstations, 770772
turning off anonymous authentication, 355
W3C extended log file format auditing, 453
web server configuration, 652656
IISlockd.exe, 435436
IISLockdown. See also IISLockdown.exe
checklists, 723
securing for developer workstations, 770771
undoing changes, 798
URLScan without, 437438
Web server configuration, 652
Web servers, 435
IISLockdown.exe
described, 795796
how to use, 795799
installing, 796
running, 797
Ildasm.exe, 607
ILease interface, 364
imperative principal permission demands, 285
imperative security, 135136, 624
impersonation. See also <identity> element
of anonymous accounts, 595597
application server, 497
ASP.NET, 286
ASP.NET application and Web services, 546547, 558559
and ASP.NET applications, 286
checklist, 711
code, 618
of fixed identities, 286, 597599
impersonation levels
choosing, 666667
code review, 636637
configuring with <processModel> element, 306
serviced components , 306307
impersonation model providing per end user authorization granularity, 84
impersonation tokens, 172
ImpersonationLevel=ImpersonationLevelOption.Identify, 306307
implementation technologies, 52
indexes
of checklists, 687688
of "how to" articles, 743
information disclosure, 17
assemblies, 148
described, 259
Web pages and controls, 259260
information gathering
described, 1819
network security, 405
infrastructure
checklists, 689
restrictions on security, 103
ingress and egress filtering, 410
inheritance
restricted, 198
restricting, 198
inheritance hierarchy, 806
innerHTML property, 277, 613
innerText property, 277, 613
input
assuming maliciousness of, 75
centralizing , 75
constraining, 77, 264, 376
fields, 610
file names , 164
rejection , 77
sanitizing, 7879, 269
validation, 2425
validation for Web applications, 7477
where to constrain, 79
input parameters
system.text.RegularExpressions.Regex for validating, 293
validating, 293
input validation
centralized approach, 75
checklist, 690, 705, 715
checklists, 696
for cross-site scripting, 273
data access, 376
how to perform, lxvii
remoted objects, 353
secure Web services, 326331
server-side, 260
strategy, 77
vulnerabilities, 105107
in Web controls and user controls, 263272
insecure defaults, 417
installation
production server considerations, 729
Web server recommendations, 432
integrated Windows authentication, 332333
integrity
as element of security, 5
on the network, 399
requirements, 325
interactive accounts, 665
interfaces
explicit, 627
and link demands, 202
unused, 412
intermediate language, 130131
internal DNS servers, 414
internal networks, 410411
Internet
clients and remoting, 668
deployment, 344
remoted objects, 352
Web applications, 74
zone permissions, 465
Internet Data Center. See IDC
intersections, 187188
intranet
deployment, 343
traffic, 449
Web applications, 74
introduction, vlviilii
Intrusion Detection Systems, 413, 679
network security, 413
IP addresses
and calling Web services, 249250
restrictions, 654
revealing , 656
IP filter lists, 778, 780
IP networks, 417
<IPermission> element, 229
IPrincipal objects
passed from the client, 358
TCPChannel considerations, 353
unauthorized access, 350
IPrincipal.IsInRole, 285286, 336
method, 137
IPSec
creating and applying policy, 781782
for filtering ports and authentication, 777786
and firewalls, 778
for machine level access control, 359
remoted objects, 361
with the TCPChannel, 481
tools, using, 785
using for filtering ports and authentication, 777786
using tools, 785
IPSecpol.exe, 785
ISAPI filters
checklists, 727
vulnerabilities, 429
Web server configuration, 655
Web servers, 429, 459460
IsCallerInRole method, 313
ISerializable interface, 218, 618
ISerializable.GetObjectData implementation, 218
IsolateApps setting, 601
IsolatedStorageFilePermission, 142, 233
IsolatedStoragePermission, 142, 193
IUnrestrictedPermission interface, 199, 805
IUSR accounts, 443



Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net