Protecting-Your-Web-Applications.pdf

(1462 KB) Pobierz
Protecting
Your Web
Applications
Solutions and Strategies to
Combat Cybersecurity Threats
Gary Sloper & Ken Hess
REPORT
Solutions and Strategies to Combat
Cybersecurity Threats
Protecting Your Web
Applications
Gary Sloper and Ken Hess
Beijing
Boston Farnham Sebastopol
Tokyo
Protecting Your Web Applications
by Gary Sloper and Ken Hess
Copyright © 2019 O’Reilly Media, Inc. All rights reserved.
Printed in the United States of America.
Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA
95472.
O’Reilly books may be purchased for educational, business, or sales promotional use.
Online editions are also available for most titles (http://oreilly.com). For more infor‐
mation, contact our corporate/institutional sales department: 800-998-9938 or
cor‐
porate@oreilly.com.
Acquisition Editor:
Nikki McDonald
Developmental Editor:
Virginia Wilson
Production Editor:
Kristen Brown
April 2019:
First Edition
Copyeditor:
Octal Publishing Services
Interior Designer:
David Futato
Cover Designer:
Randy Comer
Revision History for the First Edition
2019-04-24:
2019-06-04:
First Release
Second Release
The O’Reilly logo is a registered trademark of O’Reilly Media, Inc.
Protecting Your
Web Applications,
the cover image, and related trade dress are trademarks of O’Reilly
Media, Inc.
The views expressed in this work are those of the authors, and do not represent the
publisher’s views. While the publisher and the authors have used good faith efforts
to ensure that the information and instructions contained in this work are accurate,
the publisher and the authors disclaim all responsibility for errors or omissions,
including without limitation responsibility for damages resulting from the use of or
reliance on this work. Use of the information and instructions contained in this
work is at your own risk. If any code samples or other technology this work contains
or describes is subject to open source licenses or the intellectual property rights of
others, it is your responsibility to ensure that your use thereof complies with such
licenses and/or rights.
This work is part of a collaboration between O’Reilly and Oracle Dyn. See our
state‐
ment of editorial independence.
978-1-492-05278-4
[LSI]
Table of Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
1.
Today’s Threat Landscape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
How We Got Here
Cybersecurity Experts Respond to the Growing Threats
Current Top Threats to Web Applications
Other Common Web-Based Attacks
Threats and Impacts to Business
Conclusion
The Security Operations Center
Web Application Firewalls
Bot Management Solutions
An Integrated Approach
Conclusion
1
1
3
9
12
13
15
18
18
20
20
22
23
26
27
28
29
2.
Threat Protection Strategies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.
Threat Prevention Technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Artificial Intelligence and Machine Learning
Prevention and Mitigation Methods for Web-Based Attacks
Conclusion
Moving to the Cloud
Third-Party Outsourcing
Conclusion
4.
Next Steps for Businesses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
iii
Zgłoś jeśli naruszono regulamin