Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Web Application Security: A Multi-Tier Approach with Encryption, Slides of Software Engineering

An overview of web application security, focusing on a multi-tier approach that utilizes various security techniques such as sql injection prevention, role based access control (rbac), n-tier architecture, and encryption. The concepts behind each technique, their importance, and why they are used. It also includes references to additional resources for further learning.

Typology: Slides

2012/2013

Uploaded on 04/26/2013

sharad_984
sharad_984 🇮🇳

4.5

(13)

146 documents

1 / 25

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Web Application Security
Docsity.com
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19

Partial preview of the text

Download Web Application Security: A Multi-Tier Approach with Encryption and more Slides Software Engineering in PDF only on Docsity!

Web Application Security

Topics Covered

 Background  Our Project  Components  N-Tier  Encryption  Quick Demo (After each component)  Future  Conclusion  References

Our Project

Web Application Security

(database driven)

Create a model web application that utilizes multiple security techniques and practices to protect against the most common threats.

Components

Our Project consists of the following: Security Concerns  SQL Injection Prevention  Role Based Access Control (RBAC)  N-Tier Technique (3 Layers)  SQL Encryption (symmetrical & asymmetrical)

Technology  ASP.NET  SQL Server 2008

N-Tier – What is it?

Multi-Tier applications distribute processing across multiple layers

4 Different Layers:

  • User Interface
  • Business Logic Layer
  • Data Access Layer
  • SQL Server

Source: http://msdn.microsoft.com/en-us/library/ms973829.aspx Docsity.com

N-Tier – (1) User Interface Layer

 Graphical User Interface (GUI)

 Users can interact with the application, input data, and view the results of requests.

 Manages the manipulation and formatting of data.

Input validation occurs both on client and server side.

Validation on this layer is performed using javascript and asp vailidator.

N-Tier – (3) Data Access Layer

 The layer that actually accesses the database.

 Receives request for data from BLL.

 Based on request it queries database & calls stored procedures.

 Provides data to the Business Logic Layer.

N-Tier – (4) SQL Server

 Holds all application data.

 Query database.

 Write procedures & functions.

 Perform encryption.

Encryption

Encryption – Why use it?

 Occasionally information in a database is stolen or accessed inappropriately. Encryption ensures that data retrieved in this manner will be unreadable and unusable.

 Safeguards from databases being physically removed or stolen.

Encryption - Hierarchy

Source: http://msdn.microsoft.com/en-us/library/ms189586%28SQL.90%29.aspx Docsity.com

Source: http://msdn.microsoft.com/en-us/library/cc278098.aspx Docsity.com

Encryption - TDE

Why use Transparent Data Encryption?

 Ability to comply with many regulations and requirements

 It is completely transparent, meaning no changes to the application are necessary.

 Strong method for securing data.

 No need to manage keys storage

 Minimal performance impact (3-5%)

Future Work

  • Exception Handling.
  • Implement and Test TDE.
  • Remoting.
  • Secure Data Flow (Encryption).
  • Use of Class Libraries/Assemblies.