Skip to main content

2023 | OriginalPaper | Buchkapitel

9. World Wide Web Security

verfasst von : Seth James Nielson

Erschienen in: Discovering Cybersecurity

Verlag: Apress

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet and the World Wide Web have specific security needs and challenges, many of which relate to how applications are built on top of the original stateless HTTP protocol. We will examine these issues and the many solutions that address them.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A URI is technically a broader term than URL, and in some circumstances, the differences might be important. However, in most circumstances, they are used interchangeably.
 
2
There is also a brief overview of HTTP in Appendix C if you want to review how it interacts with other network protocols such as TCP and IP.
 
3
There are a couple of minor components that tie the two pieces together. For example, the URL in the HTTP request method must match the Common Name in the certificate sent back by the web server. But all of the HTTP request methods (e.g., GET and POST requests) and responses (e.g., 200 and 404 responses) work exactly the same.
 
4
In many cases, an eavesdropper could figure out the domain from the destination IP address that is unencrypted. However, sometimes more than one host name is associated with an IP address, and this extension leaks which of the host names the client is connecting to.
 
5
Web developers that work with both the frontend and backend are called full-stack developers.
 
Literatur
4.
8.
9.
56.
Zurück zum Zitat Berners-Lee, T. 1996. WWW: Past, present, and future. Computer 29(10): 69–77.CrossRef Berners-Lee, T. 1996. WWW: Past, present, and future. Computer 29(10): 69–77.CrossRef
87.
Zurück zum Zitat Curry, S. 2019. Cracking my windshield and earning $10,000 on the tesla bug bounty program. Curry, S. 2019. Cracking my windshield and earning $10,000 on the tesla bug bounty program.
95.
Zurück zum Zitat Dotzon, C. 2019. Practical Cloud Security: A Guide for Secure Design and Deployment. Sebastopol: O’Reilly Media. Dotzon, C. 2019. Practical Cloud Security: A Guide for Secure Design and Deployment. Sebastopol: O’Reilly Media.
108.
Zurück zum Zitat FingerpringJS, Inc. Frequently asked questions. FingerpringJS, Inc. Frequently asked questions.
129.
Zurück zum Zitat Hauk, C. 2023. What is browser fingerprinting? How it works and how to stop it. Pixel Privacy. Hauk, C. 2023. What is browser fingerprinting? How it works and how to stop it. Pixel Privacy.
135.
Zurück zum Zitat Hoglund, G., and G. McGraw. 2004. Exploiting Software. Addison-Wesley Professional. Hoglund, G., and G. McGraw. 2004. Exploiting Software. Addison-Wesley Professional.
137.
Zurück zum Zitat Howard, M., D. LeBlanc, and J. Viega. 2009. 24 Deadly Sins of Software Security. McGraw-Hill. Howard, M., D. LeBlanc, and J. Viega. 2009. 24 Deadly Sins of Software Security. McGraw-Hill.
205.
Zurück zum Zitat Peterson, L.L., and B.S. Davie. 2021. Computer Networks, 6th ed. Morgan Kaufmann.MATH Peterson, L.L., and B.S. Davie. 2021. Computer Networks, 6th ed. Morgan Kaufmann.MATH
217.
Zurück zum Zitat Rice, L. 2020. Container Security: Fundamental Technology Concepts That Protect Containerized Applications. Sebastopol: O’Reilly Media. Rice, L. 2020. Container Security: Fundamental Technology Concepts That Protect Containerized Applications. Sebastopol: O’Reilly Media.
218.
Zurück zum Zitat Ristic I., et al. 2006. Web application firewall evaluation criteria. Technical report, Web Application Security Consortium. Ristic I., et al. 2006. Web application firewall evaluation criteria. Technical report, Web Application Security Consortium.
237.
Zurück zum Zitat Seitz, J., and T. Arnold. 2021. Black Hat Python: Python Programming for Hackers and Pentesters, 2nd ed. No Starch Press. Seitz, J., and T. Arnold. 2021. Black Hat Python: Python Programming for Hackers and Pentesters, 2nd ed. No Starch Press.
255.
Zurück zum Zitat Stuttard, D., and M. Pinto. 2011. The Web Application Hacker’s Handbook: Finding and Exploiting Security, 2nd ed. Wiley. Stuttard, D., and M. Pinto. 2011. The Web Application Hacker’s Handbook: Finding and Exploiting Security, 2nd ed. Wiley.
265.
Zurück zum Zitat Tracy, M., W. Jansen, K. Scarfone, and T. Winograd. 2007. Guidelines on securing public web servers. Special Publication (NIST SP) 800-44r2, National Institute of Standards and Technology, Gaithersburg. Tracy, M., W. Jansen, K. Scarfone, and T. Winograd. 2007. Guidelines on securing public web servers. Special Publication (NIST SP) 800-44r2, National Institute of Standards and Technology, Gaithersburg.
272.
Zurück zum Zitat Vehent, J. 2018. Securing DevOps: Security in the Cloud. Shelter Island/New York: Manning Publications Co. Vehent, J. 2018. Securing DevOps: Security in the Cloud. Shelter Island/New York: Manning Publications Co.
283.
Zurück zum Zitat Wilson, Y., and A. Hingnikar. 2022. Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2, 2nd ed. Apress. Wilson, Y., and A. Hingnikar. 2022. Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2, 2nd ed. Apress.
284.
Zurück zum Zitat Wiseman, B. 2017. Page not found: A brief history of the 404 error. Wiseman, B. 2017. Page not found: A brief history of the 404 error.
287.
Zurück zum Zitat Yaworski, P. 2019. Real-World Bug Hunting: A Field Guide to Web Hacking. No Starch Press. Yaworski, P. 2019. Real-World Bug Hunting: A Field Guide to Web Hacking. No Starch Press.
Metadaten
Titel
World Wide Web Security
verfasst von
Seth James Nielson
Copyright-Jahr
2023
Verlag
Apress
DOI
https://doi.org/10.1007/978-1-4842-9560-1_9

Premium Partner