Module 2: Planning for Web Application Security

This module explains the steps that are typically involved in the Web application design process, what role security considerations play in each of these steps, and finally, how these steps interrelate with one another. In this module, students will focus on the threat analysis step in the design process by identifying Web-accessible assets and the threats that are posed to those assets, and by calculating the exposure of those assets to those threats. Finally, students will learn about developing an implementation and maintenance plan for securing Web applications | msdn training Module 2 Planning for Web Application Security Contents Overview 1 Lesson A Design Process for Building Secure Web Applications 2 Review 22 Microsoft Information in this document including URL and other Internet Web site references is subject to change without notice. Unless otherwise noted the example companies organizations products domain names e-mail addresses logos people places and events depicted herein are fictitious and no association with any real company organization product domain name e-mail address logo person place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright no part of this document may be reproduced stored in or introduced into a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording or otherwise or for any purpose without the express written permission of Microsoft Corporation. Microsoft may have patents patent applications trademarks copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft the furnishing of this document does not give you any license to these patents trademarks copyrights or other intellectual property. 2002 Microsoft Corporation. All rights reserved. Microsoft MS-DOS Windows Windows NT ActiveX Active Directory Authenticode Hotmail JScript Microsoft Press MSDN PowerPoint Visual Basic Visual C Visual Studio and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Module 2 Planning for Web Application Security iii Instructor Notes Presentation 60 minutes This module explains the steps that are typically involved in the Web application design process what

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
366    61    1    27-04-2024
16    441    9    27-04-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.