How do network attacks impact the security of enterprise Web applications? How can software quality pros do our...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
part to defend against network security threats?
Like a house with a poorly constructed foundation, a Web application that's running in an environment with vulnerable operating systems, databases, and network infrastructure devices is merely there to widen the attack surface and facilitate problems. Unmanaged network security threats make application security practically an illusion.
Although, I find fewer vulnerabilities below layer 7, they still exist and are often there waiting to be exploited. I'm referring to things like:
Mobile application security
You may also want to bone up on OWASP's top ten list of security vulnerabilities for the mobile enterprise.
- Databases and other services exposed to the Internet
- Weak, blank, or default passwords on firewalls, operating systems, and databases
- Missing patches and poor malware protection on servers and workstations that access your applications
- Improperly configured firewall rulebases, often containing stale rules that permit overreach and unauthorized access
- Lack of denial of service protection which can hamper even the most resilient of hosting providers
- Minimal audit logging and no security event oversight or correlation
As a software quality professional, you're about as disconnected from network security as network security professionals are from development and QA. You can't force people's networks to be secure but you can still help make a difference. Work with your team to document a set of recommendations for securely deploying your applications. List out the common flaws and then list out the solutions.
I've found that people simply not thinking about security problems (because they're too busy doing their own jobs) is a major contributor to the information risks we face. Getting network security threats on their radar is half the battle. Beyond that, producing a secure Web presence – at layer 7 – is all you can do.
Dig Deeper on Penetration Testing
Related Q&A from Kevin Beaver
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics.continue reading
How do self-healing networks function? Expert Kevin Beaver looks at the benefits such a network has to offer, as well as the key concepts ...continue reading
While there are numerous security benefits to a DNSSEC implementation, there are drawbacks as well. Expert Kevin Beaver explains.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.