Squash Out Security Vulnerabilities With A Web Application Firewall

Squash Out Security Vulnerabilities With A Web Application Firewall

Squash Out Security Vulnerabilities With A Web Application Firewall


Free Online Articles Directory




Why Submit Articles?
Top Authors
Top Articles
FAQ
ABAnswers

Publish Article

0 && $.browser.msie ) {
var ie_version = parseInt($.browser.version);
if(ie_version Login


Login via


Register
Hello
My Home
Sign Out

Email

Password


Remember me?
Lost Password?

Home Page > Business > Online Business > Squash Out Security Vulnerabilities With A Web Application Firewall

Squash Out Security Vulnerabilities With A Web Application Firewall

Edit Article |

Posted: Mar 22, 2010 |Comments: 0
|



]]>

There has been a lot of interest around Web application firewalls lately for two very different reasons. One is the proliferation of malicious attacks on Web sites. The second is that it is being recommended as a “best practice” for securing Web sites by global security organizations, the foremost of which is the Payment Card Industry that is headed by the world’s biggest credit card companies.

There are a lot of reasons why security vulnerabilities arise. It could be that input validation was poor, or the session is not secure, or perhaps system settings are not properly configured. It could also be the result of flaws in the Web server software or in the chosen operating system.

Most companies nowadays do not have the resource to write secure code that they employ in Web applications. This lack of resources could be manpower or time. What is more, application scanners are not 100% foolproof, while hackers are getting more and more creative everyday.

Even if you rely on third party providers for your Web applications, this does not guarantee that your Web site would be secure. What is more, most providers do not even come out with a patch to correct security flaws that are discovered after the release.

As a responsible Web site owner, you should take proactive steps to secure your Web site. Protect yourself and your visitors from potential hacking attacks or malware infection. If you do not do this for sales and profit, do it for online reputation and goodwill. A good way to do this is through the use of a Web application firewall.

What Is a Web Application Firewall?
Simply put, a Web application firewall is server application or appliance that monitors http/https data packets. It utilizes a set of criteria to promulgate security policies that you configure into it. In effect, it can block out unusual application traffic, hacking attacks and other known exploits.

You can configure it to allow all requests in and block only those that it deems malicious, or the other way around blocking all traffic unless it is known to be good. It can be used in several modes, including reverse proxy, transparent proxy, layer two bridge, network monitor, or installed on Web servers. It can have additional features like caching those pages that are often requested, load balancing and SSL acceleration.

While a Web application firewall is a useful tool in securing your Web site and your system, it is something that requires you to configure and test before you implement it. And then you have to regularly fine tune it after implementation. Another caveat is that, a Web application firewall is not a complete suite of security tools; you should use it in conjunction with other tools and as part of a wider security policy and procedures.

Retrieved from “http://www.articlesbase.com/online-business-articles/squash-out-security-vulnerabilities-with-a-web-application-firewall-2027049.html

(ArticlesBase SC #2027049)

Liked this article? Click here to publish it on your website or blog, it’s free and easy!

Charlie Sanders
About the Author:

Information Security Consultant

]]>

Questions and Answers

Ask our experts your Online Business related questions here…

Ask

200 Characters left

When there is a waf (web application firewall in place )then what is the use of application penetration testing?
Does microsoft security essentials have a firewall ?
Does microsoft security essentials contain a firewall ?

Rate this Article

1
2
3
Pages: 1 2 3 4 5 6