![Phân tích tư tưởng của nhân dân qua đoạn thơ: Những người vợ nhớ chồng… Những cuộc đời đã hóa sông núi ta trong Đất nước của Nguyễn Khoa Điềm](https://timtailieu.net/upload/document/136415/phan-tich-tu-tuong-cua-nhan-dan-qua-doan-tho-039-039-nhung-nguoi-vo-nho-chong-nhung-cuoc-doi-da-hoa-song-nui-ta-039-039-trong-dat-nuoc-cua-nguyen-khoa-136415.jpg)
Module 2: Planning for Web Application Security
Số trang: 30
Loại file: pdf
Dung lượng: 951.31 KB
Lượt xem: 16
Lượt tải: 0
Xem trước 3 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
This module explains the steps that are typically involved in the Webapplication design process, what role security considerations play in each ofthese steps, and finally, how these steps interrelate with one another. In thismodule, students will focus on the threat analysis step in the design process byidentifying Web-accessible assets and the threats that are posed to those assets,and by calculating the exposure of those assets to those threats. Finally, studentswill learn about developing an implementation and maintenance plan forsecuring Web applications....
Nội dung trích xuất từ tài liệu:
Module 2: Planning for Web Application Security Module 2: Planning for Web Application SecurityContentsOverview 1Lesson: A Design Process for BuildingSecure Web Applications 2Review 22Information in this document, including URL and other Internet Web site references, is subject tochange without notice. Unless otherwise noted, the example companies, organizations, products,domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,and no association with any real company, organization, product, domain name, e-mail address,logo, person, place or event is intended or should be inferred. Complying with all applicablecopyright laws is the responsibility of the user. Without limiting the rights under copyright, nopart of this document may be reproduced, stored in or introduced into a retrieval system, ortransmitted in any form or by any means (electronic, mechanical, photocopying, recording, orotherwise), or for any purpose, without the express written permission of Microsoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectualproperty rights covering subject matter in this document. Except as expressly provided in anywritten license agreement from Microsoft, the furnishing of this document does not give you anylicense to these patents, trademarks, copyrights, or other intellectual property.. 2002 Microsoft Corporation. All rights reserved.Microsoft, MS-DOS, Windows, Windows NT, ActiveX, Active Directory, Authenticode, Hotmail,JScript, Microsoft Press, MSDN, PowerPoint, Visual Basic, Visual C++, Visual Studio, andWindows Media are either registered trademarks or trademarks of Microsoft Corporation in theUnited States and/or other countries.The names of actual companies and products mentioned herein may be the trademarks of theirrespective owners. Module 2: Planning for Web Application Security iiiInstructor NotesPresentation: This module explains the steps that are typically involved in the Web60 minutes application design process, what role security considerations play in each of these steps, and finally, how these steps interrelate with one another. In thisLab: module, students will focus on the threat analysis step in the design process by00 minutes identifying Web-accessible assets and the threats that are posed to those assets, and by calculating the exposure of those assets to those threats. Finally, students will learn about developing an implementation and maintenance plan for securing Web applications. In this module, students will learn how to apply the STRIDE threat model that was covered in Module 1, “Introduction to Web Security,” in Course 2300, Developing Secure Web Applications. After completing this module, students will be able to describe the general approach to designing security into a Web application and categorize and identify the most common types of attacks, along with the potential threats that the attacks pose to systems, services, and data within their organizations.Required materials To teach this module, you need the following materials: ! Microsoft® PowerPoint® file 2300A_02.ppt ! A white board or flip chartPreparation tasks To prepare for this module: ! Read all of the materials for this module. ! Complete the practices. ! Read about the application design process in the Microsoft Solutions Framework (MSF). ! Read Chapter 2, “A Process for Building Secure Web Applications,” in Designing Secure Web-Based Applications for Microsoft Windows 2000, by Michael Howard (Redmond: Microsoft Press®), 2000. ! Read the TechNet article, “Best Practices for Enterprise Security,” which is available at http://www.microsoft.com/technet/security/bestprac/ bpentsec.asp. ! Review Microsoft’s security policies, which are available at http://www.microsoft.com/technet/security/policy/policies.asp. ! Read about the STRIDE threat model in Module 1, “Introduction to Web Security,” in Course 2300, Developing Secure Web Applications, and ...
Nội dung trích xuất từ tài liệu:
Module 2: Planning for Web Application Security Module 2: Planning for Web Application SecurityContentsOverview 1Lesson: A Design Process for BuildingSecure Web Applications 2Review 22Information in this document, including URL and other Internet Web site references, is subject tochange without notice. Unless otherwise noted, the example companies, organizations, products,domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,and no association with any real company, organization, product, domain name, e-mail address,logo, person, place or event is intended or should be inferred. Complying with all applicablecopyright laws is the responsibility of the user. Without limiting the rights under copyright, nopart of this document may be reproduced, stored in or introduced into a retrieval system, ortransmitted in any form or by any means (electronic, mechanical, photocopying, recording, orotherwise), or for any purpose, without the express written permission of Microsoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectualproperty rights covering subject matter in this document. Except as expressly provided in anywritten license agreement from Microsoft, the furnishing of this document does not give you anylicense to these patents, trademarks, copyrights, or other intellectual property.. 2002 Microsoft Corporation. All rights reserved.Microsoft, MS-DOS, Windows, Windows NT, ActiveX, Active Directory, Authenticode, Hotmail,JScript, Microsoft Press, MSDN, PowerPoint, Visual Basic, Visual C++, Visual Studio, andWindows Media are either registered trademarks or trademarks of Microsoft Corporation in theUnited States and/or other countries.The names of actual companies and products mentioned herein may be the trademarks of theirrespective owners. Module 2: Planning for Web Application Security iiiInstructor NotesPresentation: This module explains the steps that are typically involved in the Web60 minutes application design process, what role security considerations play in each of these steps, and finally, how these steps interrelate with one another. In thisLab: module, students will focus on the threat analysis step in the design process by00 minutes identifying Web-accessible assets and the threats that are posed to those assets, and by calculating the exposure of those assets to those threats. Finally, students will learn about developing an implementation and maintenance plan for securing Web applications. In this module, students will learn how to apply the STRIDE threat model that was covered in Module 1, “Introduction to Web Security,” in Course 2300, Developing Secure Web Applications. After completing this module, students will be able to describe the general approach to designing security into a Web application and categorize and identify the most common types of attacks, along with the potential threats that the attacks pose to systems, services, and data within their organizations.Required materials To teach this module, you need the following materials: ! Microsoft® PowerPoint® file 2300A_02.ppt ! A white board or flip chartPreparation tasks To prepare for this module: ! Read all of the materials for this module. ! Complete the practices. ! Read about the application design process in the Microsoft Solutions Framework (MSF). ! Read Chapter 2, “A Process for Building Secure Web Applications,” in Designing Secure Web-Based Applications for Microsoft Windows 2000, by Michael Howard (Redmond: Microsoft Press®), 2000. ! Read the TechNet article, “Best Practices for Enterprise Security,” which is available at http://www.microsoft.com/technet/security/bestprac/ bpentsec.asp. ! Review Microsoft’s security policies, which are available at http://www.microsoft.com/technet/security/policy/policies.asp. ! Read about the STRIDE threat model in Module 1, “Introduction to Web Security,” in Course 2300, Developing Secure Web Applications, and ...
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin tin học mạng máy tính mạng internet phần mềm virus cisco webTài liệu liên quan:
-
52 trang 442 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 332 0 0 -
74 trang 310 0 0
-
96 trang 307 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 299 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 293 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 291 1 0 -
Giáo án Tin học lớp 9 (Trọn bộ cả năm)
149 trang 280 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 279 0 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 275 0 0