Improving Web Application Security: Threats and Countermeasures
This chapter provides a methodology and steps for securing a network. The methodology can be adapted for your own scenario. The steps put the methodology into practice.
To get most out of this chapter:
-
Read Chapter 2, "Threats and Countermeasures." This will give you a better understanding of potential threats to Web applications.
-
Use the snapshot . Table 15.3, which is at the end of this chapter, provides a snapshot of a secure network. Use this table as a reference when configuring your network.
-
Use the Checklist . Use "Checklist: Securing Your Network" in the "Checklist" section of this guide, to quickly evaluate and scope the required steps. The checklist will also help you complete the individual steps.
-
Use vendor details to implement the guidance . The guidance in this chapter is not specific to specific network hardware or software vendors . Consult your vendor's documentation for specific instructions on how to implement the countermeasures given in this chapter.
Категории