Preface |
|
xv | |
Acknowledgments |
|
xvii | |
|
PART ONE Evolution of Computing, Communications, and Social Networking |
|
|
1 | (106) |
|
Chapter 1 From Mainframe to Client/Server to World Wide Web |
|
|
2 | (29) |
|
The Evolution of Data Processing |
|
|
4 | (4) |
|
Understanding Data, Data Processing, and Information |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Transformation of Brick-and-Mortar Businesses to E-commerce Businesses |
|
|
11 | (1) |
|
|
12 | (1) |
|
World Wide Web Revolution |
|
|
12 | (2) |
|
|
13 | (1) |
|
|
14 | (2) |
|
Emergence of the World Wide Web |
|
|
16 | (1) |
|
The Changing States of the World Wide Web |
|
|
16 | (5) |
|
|
16 | (2) |
|
|
18 | (2) |
|
|
20 | (1) |
|
Cloud Computing and Virtualization |
|
|
21 | (2) |
|
|
21 | (1) |
|
|
22 | (1) |
|
Lack of Inherent Security Within Protocols, Systems, Applications, and Coding Itself |
|
|
23 | (6) |
|
System and Protocol Security |
|
|
23 | (2) |
|
Securing IP Communications |
|
|
25 | (1) |
|
Managing Application and Coding Security |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Chapter 2 From Brick-and-Mortar to E-commerce to E-business Transformation |
|
|
31 | (29) |
|
The Evolution of Business from Brick-and-Mortar to the WWW |
|
|
33 | (1) |
|
E-commerce: A Brick-and-Mortar Model |
|
|
33 | (1) |
|
Customer-Focused E-commerce |
|
|
33 | (1) |
|
Emerging Trends in E-commerce: Distributed E-commerce |
|
|
34 | (1) |
|
Top-of-Mind Business Drivers |
|
|
34 | (1) |
|
Solving Common Business Challenges |
|
|
35 | (7) |
|
|
35 | (1) |
|
Managing the Customer Life Cycle |
|
|
36 | (1) |
|
Implementing an Effective Internet Marketing Strategy |
|
|
37 | (1) |
|
Creating New Revenue Streams |
|
|
38 | (1) |
|
Enhancing Customer Service Delivery |
|
|
38 | (1) |
|
Telecommuting and Secure Access for Remote Employees |
|
|
39 | (1) |
|
Maintaining Highly Available and Secure E-mail and Web Site Hosting |
|
|
40 | (2) |
|
|
42 | (6) |
|
Customer Acquisition and Revenue Growth |
|
|
43 | (3) |
|
E-commerce and Enhanced Customer Service Delivery |
|
|
46 | (1) |
|
E-business with Integrated Applications |
|
|
47 | (1) |
|
Internet Marketing Strategies |
|
|
48 | (5) |
|
E-mail Distribution Lists and E-mail Blasting |
|
|
49 | (1) |
|
Lead-Generation Web Sites |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
Risks, Threats, and Vulnerabilities with Web Sites |
|
|
53 | (5) |
|
Connecting to the Internet Means You Are Connecting to the Outside World |
|
|
54 | (1) |
|
Web Sites Are Prone to Attack and Scrutiny |
|
|
54 | (1) |
|
E-commerce Applications House Customer Privacy Data and Credit Card Transaction Processing Data |
|
|
55 | (1) |
|
Web-Enabled Applications May Face Threats and Vulnerabilities |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Chapter 3 Evolution of People-to-People Communications |
|
|
60 | (25) |
|
Personal Versus Business Communications |
|
|
61 | (3) |
|
|
61 | (1) |
|
Voice over Internet Protocol |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
Evolution of Communications |
|
|
64 | (11) |
|
Voice: Analog, Digital, VoIP |
|
|
64 | (3) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
VoIP/SIP-Enabled Applications |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
Collaborative Communications |
|
|
74 | (1) |
|
Social Media and Social Networking |
|
|
75 | (5) |
|
What Are Social Media and Social Networking? |
|
|
75 | (1) |
|
Virtual Communities and Online Social Groups |
|
|
76 | (1) |
|
Generation-Y People-to-People Communications |
|
|
77 | (1) |
|
Online Presence and Networking---Personal and Professional |
|
|
77 | (3) |
|
|
80 | (2) |
|
|
80 | (1) |
|
Social Networking Protocols |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Limitations of Liability of Web Site Owners |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
Chapter 4 From Personal Communication to Social Networking |
|
|
85 | (22) |
|
The History and Evolution of E-mail |
|
|
86 | (1) |
|
|
86 | (1) |
|
The Rules for E-mail Communication |
|
|
87 | (3) |
|
Rules for Personal E-mail |
|
|
88 | (1) |
|
Rules for Business E-mail |
|
|
88 | (2) |
|
The Key Elements of Web Pages |
|
|
90 | (2) |
|
Understanding Eye Paths and Heat Maps |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Online Virtual Community Portals |
|
|
93 | (1) |
|
|
94 | (1) |
|
Risks, Threats, and Vulnerabilities with Personal Communications and Social Networks |
|
|
95 | (8) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (2) |
|
PART TWO Secure Web-Enabled Application Deployment and Social Networking |
|
|
107 | (202) |
|
Chapter 5 Mitigating Risk When Connecting to the Internet |
|
|
108 | (34) |
|
Threats When Connecting to the Internet |
|
|
109 | (11) |
|
|
109 | (8) |
|
Vulnerabilities and Exploits |
|
|
117 | (1) |
|
|
118 | (2) |
|
|
120 | (9) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (6) |
|
The Seven Domains of a Typical IT Infrastructure |
|
|
129 | (1) |
|
Protecting Networks in the LAN-to-WAN Domain |
|
|
129 | (10) |
|
Perimeter Defense Strategies |
|
|
130 | (2) |
|
|
132 | (2) |
|
Demilitarized Zones (DMZs) |
|
|
134 | (1) |
|
|
135 | (1) |
|
Intrusion Detection Systems and Intrusion Protection Systems |
|
|
136 | (3) |
|
Best Practices for Connecting to the Internet |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
Chapter 6 Mitigating Web Site Risks, Threats, and Vulnerabilities |
|
|
142 | (25) |
|
Who Is Coming to Your Web Site? |
|
|
143 | (3) |
|
Whom Do You Want to Come to Your Web Site? |
|
|
146 | (2) |
|
Does Your Web Site Accept User Input? |
|
|
148 | (2) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
The Open Web Application Security Project (OWASP) Top 10 |
|
|
150 | (13) |
|
Cross-Site Scripting (XSS) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Insecure Direct Object Reference |
|
|
153 | (1) |
|
Cross-Site Request Forgery |
|
|
154 | (1) |
|
Information Leakage and Improper Error Handling |
|
|
155 | (1) |
|
Broken Authentication and Session Management |
|
|
156 | (3) |
|
Insecure Cryptographic Storage |
|
|
159 | (1) |
|
|
159 | (4) |
|
Failure to Restrict URL Access |
|
|
163 | (1) |
|
|
163 | (1) |
|
Best Practices for Mitigating Known Web Application Risks, Threats, and Vulnerabilities |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Chapter 7 Introducing the Web Application Security Consortium (WASC) |
|
|
167 | (33) |
|
WASC Threat Classification |
|
|
168 | (1) |
|
|
169 | (18) |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
172 | (2) |
|
Credential/Session Prediction |
|
|
174 | (1) |
|
|
174 | (1) |
|
Cross-Site Request Forgery |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
Predictable Resource Location |
|
|
181 | (1) |
|
Remote File Inclusion (RFI) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (10) |
|
Application Misconfiguration |
|
|
187 | (1) |
|
|
187 | (1) |
|
Improper File System Permissions |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Insufficient Anti-Automation |
|
|
192 | (1) |
|
Insufficient Authentication |
|
|
193 | (1) |
|
Insufficient Authorization |
|
|
193 | (1) |
|
Insufficient Password Recovery |
|
|
194 | (1) |
|
Insufficient Process Validation |
|
|
194 | (1) |
|
Insufficient Session Expiration |
|
|
194 | (1) |
|
Insufficient Transport Layer Protection |
|
|
195 | (1) |
|
|
195 | (2) |
|
Best Practices for Mitigating Attack Risks |
|
|
197 | (1) |
|
Best Practices for Mitigating Weaknesses |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
Chapter 8 Securing Web Applications |
|
|
200 | (24) |
|
Does Your Application Require User Input into Your Web Site? |
|
|
201 | (2) |
|
Get to Know Your Syntax with Request for Comments (RFC) |
|
|
203 | (1) |
|
Technologies and Systems Used to Make a Complete Functional Web Site |
|
|
203 | (4) |
|
Hypertext Markup Language (HTML) |
|
|
204 | (1) |
|
Common Gateway Interface (CGI) Script |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Does Your Development Process Follow the Software Development Life Cycle (SDLC)? |
|
|
207 | (1) |
|
Designing a Layered Security Strategy for Web Sites and Web Applications |
|
|
208 | (1) |
|
Incorporating Security Requirements Within the SDLC |
|
|
209 | (3) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
Acceptance and Deployment Stage |
|
|
211 | (1) |
|
|
211 | (1) |
|
HTTP and Clear Text Versus HTTPS and Encryption |
|
|
212 | (1) |
|
SSL---Encryption for Data Transfer Between Client and Web Site |
|
|
213 | (2) |
|
SSL Encryption and Hash Protocols |
|
|
214 | (1) |
|
Selecting an Appropriate Access Control Solution |
|
|
215 | (5) |
|
Discretionary Access Control |
|
|
217 | (1) |
|
|
218 | (1) |
|
Rule-Based Access Control |
|
|
218 | (1) |
|
Role-Based Access Control |
|
|
219 | (1) |
|
Create Access Controls That Are Commensurate with the Level of Sensitivity of Data-Access or Input |
|
|
220 | (1) |
|
Best Practices for Securing Web Applications |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
Chapter 9 Mitigating Web Application Vulnerabilities |
|
|
224 | (22) |
|
Causes of Vulnerabilities |
|
|
226 | (6) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Vulnerabilities Are Caused by Non-Secure Code in Software Applications |
|
|
229 | (3) |
|
Developing Policies to Mitigate Vulnerabilities |
|
|
232 | (4) |
|
Implementing Secure Coding Best Practices |
|
|
236 | (1) |
|
Incorporating HTML Secure Coding Standards and Techniques |
|
|
237 | (1) |
|
Incorporating JavaScript Secure Coding Standards and Techniques |
|
|
238 | (2) |
|
Incorporating CGI Form and SQL Database Access Secure Coding Standards and Techniques |
|
|
240 | (1) |
|
|
240 | (1) |
|
Implementing Software Development Configuration Management and Revision-Level Tracking |
|
|
241 | (1) |
|
|
242 | (1) |
|
Best Practices for Mitigating Web Application Vulnerabilities |
|
|
242 | (2) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
Chapter 10 Maintaining PCI DSS Compliance for E-Commerce Web Sites |
|
|
246 | (20) |
|
Credit Card Transaction Processing |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (2) |
|
If PCI DSS Is Not a Law, Why Do You Need to Be in Compliance? |
|
|
250 | (1) |
|
Designing and Building Your E-commerce Web Site with PCI DSS in Mind |
|
|
250 | (1) |
|
What Does a PCI DSS Security Assessment Entail? |
|
|
251 | (3) |
|
|
252 | (1) |
|
Instructions and Content for Report on Compliance |
|
|
253 | (1) |
|
Detailed PCI DSS Requirements and Security Assessment Procedures |
|
|
254 | (1) |
|
Security Assessment Marking Procedure |
|
|
254 | (1) |
|
Best Practices to Mitigate Risk for E-commerce Web Sites with PCI DSS Compliance |
|
|
254 | (10) |
|
Build and Maintain a Secure Network |
|
|
255 | (1) |
|
|
256 | (2) |
|
Maintain a Vulnerability Management Program |
|
|
258 | (1) |
|
Implement Strong Access Control Measures |
|
|
259 | (3) |
|
Regularly Monitor and Test Networks |
|
|
262 | (1) |
|
Maintain an Information Security Policy |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
Chapter 11 Testing and Quality Assurance for Production Web Sites |
|
|
266 | (17) |
|
Development and Production Software Environments |
|
|
267 | (1) |
|
Software Development Life Cycle (SDLC) |
|
|
267 | (1) |
|
Configuration and Change Management |
|
|
268 | (4) |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Building a Test Plan and Functionality Checklist for Web Site Deployments |
|
|
272 | (3) |
|
Testing All New Applications and Features |
|
|
275 | (1) |
|
Detecting Security Gaps and Holes in Web Site Applications |
|
|
276 | (1) |
|
Mitigating Any Identified Gaps and Holes and Retesting |
|
|
277 | (1) |
|
Deploying Web Site Applications in a Production Environment |
|
|
278 | (1) |
|
Monitoring and Analyzing Web Site Traffic, Use, and Access |
|
|
278 | (1) |
|
Best Practices for Testing and Assuring Quality of Production Web Sites |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
Chapter 12 Performing a Web Site Vulnerability and Security Assessment |
|
|
283 | (26) |
|
Software Testing Versus Web Site Vulnerability and Security Assessments |
|
|
284 | (1) |
|
Performing an Initial Discovery on the Targeted Web Site |
|
|
285 | (6) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
Nessus Vulnerability and Port Scan |
|
|
289 | (2) |
|
Performing a Vulnerability and Security Assessment |
|
|
291 | (6) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Web Site Forms and User Inputs |
|
|
295 | (1) |
|
Incorporate PCI DSS for E-commerce Web Sites |
|
|
295 | (2) |
|
Using Planned Attacks to Identify Vulnerabilities |
|
|
297 | (2) |
|
|
297 | (1) |
|
|
297 | (1) |
|
Escalate the Privilege Level |
|
|
298 | (1) |
|
Spotting Vulnerabilities in Back-End Systems and SQL Databases |
|
|
299 | (2) |
|
|
299 | (1) |
|
|
299 | (1) |
|
Escalate the Privilege Level |
|
|
300 | (1) |
|
Perform an SQL Injection for Data Extraction |
|
|
300 | (1) |
|
Preparing a Vulnerability and Security Assessment Report |
|
|
301 | (4) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Best Practices for Web Site Vulnerability and Security Assessments |
|
|
305 | (2) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
Research, Research, Research |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
PART THREE Web Applications and Social Networking Gone Mobile |
|
|
309 | (68) |
|
Chapter 13 Securing Endpoint Device Communications |
|
|
310 | (23) |
|
|
311 | (4) |
|
|
311 | (1) |
|
|
312 | (2) |
|
|
314 | (1) |
|
Wireless Networks and How They Work |
|
|
315 | (4) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
Security Features of 3G and 4G Networks |
|
|
318 | (1) |
|
Endpoint Device Communications |
|
|
319 | (5) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Instant Messaging (IM) Chat |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Endpoint Device Communication Risks, Threats, and Vulnerabilities |
|
|
324 | (1) |
|
Best Practices for Securing Endpoint Device Communications |
|
|
325 | (5) |
|
Technological Security of Devices |
|
|
326 | (1) |
|
Physical Security of Devices |
|
|
327 | (3) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (2) |
|
Chapter 14 Securing Personal and Business Communications |
|
|
333 | (24) |
|
Store-and-Forward Communication |
|
|
334 | (2) |
|
|
335 | (1) |
|
|
336 | (5) |
|
|
336 | (2) |
|
|
338 | (2) |
|
Social Networking Site Messages |
|
|
340 | (1) |
|
|
341 | (7) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (2) |
|
|
348 | (1) |
|
Telephony/Private Branch Exchange (PBX) Communication Security Best Practices |
|
|
348 | (1) |
|
VoIP Communication Security Best Practices |
|
|
349 | (2) |
|
VoIP Planning Best Practices |
|
|
350 | (1) |
|
VoIP Implementation Best Practices |
|
|
350 | (1) |
|
SIP Application (Unified Communications) Best Practices |
|
|
351 | (4) |
|
SIP Features and Essentials |
|
|
351 | (1) |
|
SIP User Agents and Communication Between Them |
|
|
352 | (2) |
|
Implementation Best Practices |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
Chapter 15 Web Application Security Organizations, Education, Training, and Certification |
|
|
357 | (20) |
|
Department of Homeland Security (DHS) |
|
|
358 | (2) |
|
|
358 | (1) |
|
The U.S. Secret Service (USSS) |
|
|
358 | (1) |
|
The Federal Law Enforcement Training Center (FLETC) |
|
|
359 | (1) |
|
National Cyber Security Division (NCSD) |
|
|
360 | (1) |
|
United States Computer Emergency Response Team (US-CERT) |
|
|
360 | (1) |
|
Cyber-Risk Management Programs |
|
|
360 | (1) |
|
Computer Emergency Response Team Coordination Center (CERT®/CC) |
|
|
361 | (1) |
|
The MITRE Corporation and the CVE List |
|
|
362 | (2) |
|
|
362 | (1) |
|
Common Vulnerabilities and Exposures (CVE) List |
|
|
362 | (2) |
|
National Institute of Standards and Technology (NIST) |
|
|
364 | (2) |
|
Technical Security Standards |
|
|
364 | (1) |
|
Computer Security Resource Center (CSRC) |
|
|
365 | (1) |
|
International Information Systems Security Certification Consortium, Inc. (ISC)2 |
|
|
366 | (5) |
|
Certified Information Systems Security Professional (CISSP) |
|
|
366 | (2) |
|
Systems Security Certified Practitioner (SSCP) |
|
|
368 | (1) |
|
|
369 | (1) |
|
Certification and Accreditation Professional (CAP) |
|
|
370 | (1) |
|
Certified Secure Software Lifecycle Professional (CSSLP) |
|
|
370 | (1) |
|
Web Application Security Consortium (WASC) |
|
|
371 | (1) |
|
|
371 | (1) |
|
Open Web Application Security Project (OWASP) |
|
|
372 | (3) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
Enterprise Security API (ESAPI) |
|
|
373 | (1) |
|
|
373 | (1) |
|
Open Software Assurance Maturity Model (OpenSAMM) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
Appendix A Answer Key |
|
377 | (2) |
Appendix B Standard Acronyms |
|
379 | (2) |
Glossary of Key Terms |
|
381 | (10) |
References |
|
391 | (6) |
Index |
|
397 | |