Security of web servers and web services

Research output: Contributions to collected editions/worksContributions to collected editions/anthologiesResearch

Authors

Web servers and the Web services associated with them have become increasingly important in the last few years. Online banking, e-mail, and money, business- to-business (B2B), and business-to-client (B2C) transactions are growing rapidly. It is difficult to imagine modern business without these forms of networking. However, there are also significant negative aspects. In many cases, due to competitive pressures, companies and government agencies had to implement these services very fast, often too fast and without any appreciation of the concepts of security and protection. As a consequence, it turns out that a hacker can misuse with little effort these Web services or compromise the underlying database (e.g., to obtain access to credit cards numbers or social insurance information). A very significant percentage of the population in developed and developing countries is using wired and wireless connections for reading e-mails, accessing newsgroups, or using Internet banking. All these services are running on a Web server. Most Web servers are running the Apache or the Microsoft Internet Information Server (IIS) (all versions of both servers [Apache 1.3.x/2.x, IIS 3-6]) (Netcraft, 2006). Of these, older versions of the Internet Information Server are especially vulnerable to numerous attacks. Therefore, an attacker is in a position to break, with little effort, into many Web servers running IIS 4 or 5. However, the Apache Web server (running on Windows systems) is also vulnerable to similar attacks. Moreover, using a Web server based on UNIX or Linux is not a guarantee for a secure system. UNIX and Linux systems are also affected by inherent weaknesses and vulnerabilities such as buffer overflows and the handling of format strings (ZDNet, 2006). Readers who like to have more general insight are referred to works by Leiss (1990) and Garfinkel and Spafford (2002). These books give broader perspectives on Internet security.
Original languageEnglish
Title of host publicationEncyclopedia of multimedia technology and networking
EditorsMargherita Pagani
Number of pages9
Place of PublicationHershey, PA
PublisherInformation Science Reference
Publication date2009
Pages1284-1292
ISBN (print)978-1605660141, 1605660140
Publication statusPublished - 2009

Recently viewed

Publications

  1. Polar Coordinates and Interactive Learning
  2. Experimental Verification of the Impact of Radial Internal Clearance on a Bearing's Dynamics
  3. Conceptualizing community in energy systems
  4. Analog, Digital, and the Cybernetic Illusion
  5. The creation and analysis of employer-employee matched data, ed. by John C. Haltiwanger ...
  6. Safer Spaces
  7. Using measures of reading time regularity (RTR) to quantify eye movement dynamics, and how they are shaped by linguistic information
  8. Governing Objects from a Distance
  9. Navigating the dimensions of criticality
  10. Increased Reliability of Draw-In Prediction in a Single Stage Deep-Drawing Operation via Transfer Learning
  11. Development of a cell culture system for studying effects of native and photochemically transformed gaseous compounds using an air/liquid culture technique
  12. Lessons from community-based payment for ecosystem service schemes
  13. Steering of land use in the context of sustainable development
  14. Development and validation of a U.S. and German short version of the Later Life Workplace Index (LLWI-S)
  15. Making transparency transparent
  16. Perfectly nested or significantly nested - an important difference for conservation management
  17. Writing as a Deeper Form of Concentration
  18. Mathematical Model of Double Row Self-Aligning Ball Bearing
  19. Consumer information problems
  20. A Note on Pensions and Firm Performance
  21. Decoding evidence-based entrepreneurship
  22. Rotational complexity in mental rotation tests
  23. Working hour arrangements and working hours
  24. The implications of knowledge hiding at work for recovery after work: A diary study
  25. DigiSchreib
  26. Friction Riveting of FR4 substrates for printed circuit boards
  27. Future-proofing ecosystem restoration through enhancing adaptive capacity
  28. Exploring priority and year effects on plant diversity, productivity and vertical root distribution: first insights from a grassland field experiment
  29. Comparison between UKF and EKF in Sensorless Synchronous Reluctance Motor Drives