O'Reilly logo

IT Auditing: Using Controls to Protect Information Assets by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8Auditing Web Servers and Web Applications

The explosive growth in the Internet has also driven an explosive growth in development tools, programming languages, web browsers, databases, and different client-server models. The unfortunate result is that complex models often require additional controls to secure the model. This chapter covers the absolute bare minimum set of controls that should be reviewed. This chapter covers the following:

• How to audit a web server

• How to audit a web application

Background

Few technology inventions have changed our lives as much—or as quickly—as web applications. The web interface has grown from static pages to an incredibly interactive blend of capabilities driven by an army of creative programmers. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required