Why Do Web Applications Need to be Secure? What is a web application? ; What is computer security? ; Examples of damage caused by security failures -- Estimating Risk. What is risk? ; How can we protect ourselves from risk? ; Determining the target ; Determining the impact ; Which causes or scenarios should be considered? ; How should this study be performed in a company setting? -- Encryption and Web Server Configuration. Examples of different web servers ; Introduction to concepts in encryption ; Generating and managing encryption certificates ; Implementing the HTTPS protocol ; Improving the security of the Apache server -- Threats and Protecting Against Them. The threats associated with web-based environments ; The top 10 most frequent attacks in 2013 ; Other countermeasures ; Implementing a resource controller -- Managing User Logins and Assigning. Permissions ; Managing user logins ; Managing permissions -- Using the MVC model to structure the application. Why does the application structure matter? ; What is the MVC model? ; Conclusion -- Implementing a Suitable Technical Platform and Testing the Application. Designing a suitable technical architecture ; Testing the security of the application ; What options do we have if implementing security measures for an application seems an impossible task?
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.