CHAPTER 21
WEB-BASED VULNERABILITIES
Anup K. Ghosh, Kurt Baumgarten, Jennifer Hadley, and Steven Lovaas
21.2 BREAKING E-COMMERCE SYSTEMS
21.3 CASE STUDY OF BREAKING AN E-BUSINESS
21.4 WEB APPLICATION SYSTEM SECURITY
21.5 PROTECTING WEB APPLICATIONS
21.6 COMPONENTS AND VULNERABILITIES IN E-COMMERCE SYSTEMS
21.6.3 Business Application Logic
21.6.4 CGI Script Vulnerabilities
21.1 INTRODUCTION.
This chapter systematically reviews the primary software components that make up Web applications, with a primary focus on e-commerce, and provides an overview of the risks to each of these components.1 The goal of this chapter is to point out that every system will have risks to its security and privacy that need to be systematically analyzed and ultimately addressed.
21.2 BREAKING E-COMMERCE SYSTEMS.
To make a system more secure, it may be advisable to break it. Finding the vulnerabilities in a system is necessary in order to strengthen it, but breaking an e-commerce system requires a different mind-set from that of the programmers who developed it. Instead of thinking about developing within a specification, a criminal or hacker looks outside the specifications.
Hackers believe that rules exist only to be broken, and they always use a system in unexpected ways. In doing ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.