Server-Side Security

Slim Rekhis and Noureddine Boudriga, National Digital Certification Agency and University of Carthage, Tunisia

M. S. Obaidat, Monmouth University

Server Vulnerabilities

Software Vulnerabilities

Server Security Policies

Protocol Vulnerabilities

Server Security Issues

Server Security Policies

Management of Users

Auditing Server Security

System Configurations

Management of Logs

Protecting Servers from Overload

Traffic Shaping

Load Controlling

Policy Management

Protecting from Denial of Service

Server Scripting Issues

Risk Mitigation in the Use of Scripts

Writing Safe CGI Scripts

Reducing CGI Risk Using Wrappers

Access Control

Types of Access Control

IP-Based Control

Name-Based Control

Access Control and Scripts

Certificate-Based Access Control

Guidelines for Improving Server Security

Server-Side Security Practices

Effective Use of Security Software

Infrastructure Countermeasures

Advanced Issues

Remote Authoring and Administration

Server-Side Transactions Security

Glossary

Cross References

References

SERVER VULNERABILITIES

Securing a server is a difficult and challenging task that cannot be fully accomplished. Introducing an additional solution to enhance a server's security can increase vulnerability and exposure to further threats. One answer to the problem is to understand server vulnerabilities and start implementing a risk-mitigation approach. In general, server security vulnerabilities might exist in three main areas: installed software, defined and enforced ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.