O'Reilly logo

Security Strategies in Web Applications and Social Networking by Mike Harwood

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Mitigating Web Site Risks, Threats, and Vulnerabilities

PERIMETER NETWORK SOLUTIONS—firewalls, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), and demilitarized zones (DMZs)—are all needed for network security, but they manage only part of the risk. Today's networks require much more than perimeter security. Internal services such as e-mail, File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), and Telnet operate 24/7 and are a security battleground. These protocols and Web applications form the basis of the modern business economy, and that makes them a target for hackers.

In some respects, managing Web application security is more difficult than other traditional network areas. Among the many facets ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required