Zusammenfassung der Ressource
Computer
Security U10 -
Web Security
- Web basics
- HTTP
- HTML
- URL
- TCP/IP
protocol
- stateless
- unprotected
- security
issues
- C I A
- availability
- Web applications
- functionality
- server-side
- SQL
Injection
attack
- client -side
- active
content
- mobile
code
- attack =
"jumping the
firewall
- safeguards
- blocking/filtering
before
execution
- restricting
functionality
- Sandboxing
- code
signing
- digital
signature
- assumes fully
implemented PKI
- Java Virtual
Machine
(JVM)
- trusted
sources
- attacks
- Parameter
injection
- Cross-site
scripting
- File
traversals
- Authentication
- SSL
- SSO
- local
password
storage
- proprietary,
vendor-specific
solutions
- centralised
approach
- federated
approach
- Library
Alliance
- MS Passport
- Pros
- no special
s/ware
needed
- Cons
- central
server =
single point of
failure
- data mining
- Privacy
- Web session
traces
- cookies
- session
management
- personalised
web offers
- authentication
- server
logs
- cached web
pages
- Transmission security
- Secure Socket
Layer (SSL) & Transport
Layer Security
(TLS)
- security
services
- strong
authentication
- integrity
- confidentiality
(encryption)
- stops: spoofing
eavesdropping
manipulation
- deployment
- not a
single
solution
- security
ends outside
tunnel
- dependent
on PKI
- Browser security
- settings
- SSL
- cookies
- active content
- caching
- passwords
- complex/numerous
- Web services
- idea
- services in
machine-readable
form
- technology
- HTTP
- XML
- SOAP
- WSDL
- UDDI
- security
- initiatives
- add security
mechanisms
- web services
- issues
- delegation
- over
company
borders
- transaction
- end-to-end
- message-level
- for open infrastructure
- between "strangers"