Security of web servers and web services

Research output: Contributions to collected editions/worksContributions to collected editions/anthologiesResearch

Authors

Web servers and the Web services associated with them have become increasingly important in the last few years. Online banking, e-mail, and money, business- to-business (B2B), and business-to-client (B2C) transactions are growing rapidly. It is difficult to imagine modern business without these forms of networking. However, there are also significant negative aspects. In many cases, due to competitive pressures, companies and government agencies had to implement these services very fast, often too fast and without any appreciation of the concepts of security and protection. As a consequence, it turns out that a hacker can misuse with little effort these Web services or compromise the underlying database (e.g., to obtain access to credit cards numbers or social insurance information). A very significant percentage of the population in developed and developing countries is using wired and wireless connections for reading e-mails, accessing newsgroups, or using Internet banking. All these services are running on a Web server. Most Web servers are running the Apache or the Microsoft Internet Information Server (IIS) (all versions of both servers [Apache 1.3.x/2.x, IIS 3-6]) (Netcraft, 2006). Of these, older versions of the Internet Information Server are especially vulnerable to numerous attacks. Therefore, an attacker is in a position to break, with little effort, into many Web servers running IIS 4 or 5. However, the Apache Web server (running on Windows systems) is also vulnerable to similar attacks. Moreover, using a Web server based on UNIX or Linux is not a guarantee for a secure system. UNIX and Linux systems are also affected by inherent weaknesses and vulnerabilities such as buffer overflows and the handling of format strings (ZDNet, 2006). Readers who like to have more general insight are referred to works by Leiss (1990) and Garfinkel and Spafford (2002). These books give broader perspectives on Internet security.
Original languageEnglish
Title of host publicationEncyclopedia of multimedia technology and networking
EditorsMargherita Pagani
Number of pages9
Place of PublicationHershey, PA
PublisherInformation Science Reference
Publication date2009
Pages1284-1292
ISBN (print)978-1605660141, 1605660140
Publication statusPublished - 2009

Recently viewed

Publications

  1. Kultur als Materialität oder Material – Diskurstheorie oder Diskursanalyse?
  2. Diversity lost
  3. V/2. Ethisch
  4. Working Hour Tension Dynamics
  5. A trust inoculation to protect public support of governmentally mandated actions to mitigate climate change
  6. Das Pumpspeicherwerk in Geesthacht
  7. Transformational ethics to bridge the void between facts and truths
  8. Robot Makes Free
  9. Kommunikative Interferenzen
  10. Konzeptionsentwicklung – eine Einführung
  11. Part III: Motion and control of autonomous unmanned aerial systems as a challenge in Industry 4.0 process
  12. Wege zum Campus
  13. Fourier methods for quasi-periodic oscillations
  14. Discussion Report: The Proposal for a Directive on the Single-Member Private Limited Liability Company
  15. Communicating effectively about CSR on Twitter
  16. Carbon performance and corporate financial performance during crises
  17. Generalizing Trust
  18. Leben in Dörfern
  19. Endogenous redistributive cycles
  20. Betriebsklima in kleinen und mittleren Unternehmen
  21. Gewerkschaften
  22. Von Zahlenmustern zur vollständigen Induktion
  23. The Ecological Performance of Jit Logistics
  24. Kälteschock und Schmelze
  25. Is there monopsonistic discrimination against immigrants?
  26. Die Beschaffung von Kooperation
  27. Mehr Füchse, weniger Igel!
  28. Grundversorgung statt Emanzipation?
  29. The impact of climate change on the external cost of pesticide applications in US agriculture
  30. Social perceptions of the impacts and benefits of invasive alien species
  31. Reforming the Stability and Growth Pact in Times of Crisis
  32. Effects of elevated growth temperature and enhanced atmospheric vapour pressure deficit on needle and root terpenoid contents of two Douglas fir provenances
  33. TransPuG und Corporate Governance Kodex
  34. Pierre Bourdieu (1930-2002)