Every newly deployed web application creates a new security hole and potential access of your organization’s data. Hackers gain access to data by sneaking through ports that are supposedly hidden behind firewalls. There is no way to guarantee that your web application is 100 percent secure. If it has never been attacked by hackers, most likely it’s too small and is of no interest to them.
This chapter provides a brief overview of major security vulnerabilities of which web application developers need to be aware. We also cover delegated authorization with OAuth, and possible authentication and authorization scenarios for our Save The Child application.
There are plenty of books and online articles that cover security, and enterprises usually have dedicated teams handling security for the entire organization. Dealing with security threats is their bread and butter, and this chapter won’t have revelations for security professionals. But a typical enterprise application developer just knows that each person in the organization has an account in some kind of a naming server that stores IDs, passwords, and roles, which takes care of authentication and authorization flows. Application developers should find useful information in this chapter.
If an enterprise developer needs access to an internal application, opening the issue with the technical support team grants the required access privileges. But software developers should have at least a broad understanding of what makes a web application more or less secure, and which threats web applications face—this is what this chapter is about. To implement any of the security mechanisms mentioned in this chapter, you’ll need to do additional research.
HTTP versus HTTPS
Imagine a popular nightclub with a tall fence and two entry doors. People are waiting in lines to get in. Door number 80 is not guarded in any way: a college student checks tickets but lets people in whether or not they have a ticket. The other door has the number 443 on it, and it’s protected by an armed bully letting only qualified people in. The chances of unwanted people getting into the club through door 443 are pretty slim (unless the bully is corrupt), which is not the case with door 80—once in a while, people who have no right to be there get inside.On a similar note, your organization has created network security with a firewall (the fence) with only two ports (the doors) open: 80 for HTTP requests and 443 for HTTPS. One door is not secure; the other one is.
copied https://books.google.cz/books?id=xF_xAwAAQBAJ&pg=PA333&lpg=PA333&dq=Every+newly+deployed+web+application+creates+a+new+security+hole+and+potential+access+of+your+organization%E2%80%99s+data.&source=bl&ots=--oxtYx9iE&sig=SpeQbNzSE5FwT_BAqjohf8_JnNI&hl=cs&sa=X&ved=0ahUKEwiDiL_tqtXUAhVLChoKHQnOB30Q6AEILTAA#v=onepage&q=Every%20newly%20deployed%20web%20application%20creates%20a%20new%20security%20hole%20and%20potential%20access%20of%20your%20organization%E2%80%99s%20data.&f=false
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit