Page 321 - StudyBook.pdf
P. 321

Communication Security: Web Based Services • Chapter 5  305


                   Limit Access and Back up Your Site
               Damage & Defense…  destroy data on the site. Some malicious hackers may modify a site so
                   Hackers may attack a site for different reasons. Some may simply poke
                   around, look at what is there, and leave, whereas others may modify or

                   that sensitive material is not destroyed, but the effects are more akin to
                   graffiti. This was the case when data was modified on the Web site of the
                   Royal Canadian Mounted Police (RCMP). Cartoon images appeared on
                   the site, showing RCMP officers riding pigs rather than horses. Although
                   the images were quickly fixed by simply uploading the original content
                   to the server, this case illustrates the need to set proper permissions on
                   directories and regularly back up a site.
                        Often, content is created on one computer and then transferred it to
                   the actual Web site (unless using a program such as Front Page that
                   allows you to work directly on the Web site). In many cases, the adminis-
                   trator may feel this is enough, since they will have a copy of the content
                   on the machine where it was originally created. By backing up content,
                   they are insuring that if a script, applet, or component is misused, the site
                   can be restored and repaired quickly.
                        Before a problem occurs (and especially after one happens), the
                   administrator should review permissions to determine if anonymous or
                   low-level users have more access than they should. If they can write to a
                   directory or execute files, they may find that this is too much access
                   (depending on the directory in question). In any case, administrators
                   should not give users any more access to a directory than they need, and
                   the directories lower in the hierarchy should be checked to ensure that
                   they do not have excessive permissions due to their location. In other
                   words, if a directory is lower in the hierarchy, it may have inherited the
                   same permissions as its parent directory, even though you do not want
                   the lower level directory to have such a high level of access.
                        In evaluating the security of a site, you should also identify any
                   accounts that are no longer used or needed. A user account may be cre-
                   ated for a database or to access a directory on a Web site, but after a
                   time, it is no longer used. Such accounts should be deleted if there is no
                   need for them, and any accounts that are needed should have strong
                   passwords. By limiting the avenues of attack, a hacker’s ability to exploit
                   vulnerabilities becomes increasingly more difficult.

                    Because of the possible damage a Java applet, JavaScript, or ActiveX component
                 can do to a network in terms of threatening security or attacking machines, many
                 companies filter out applets completely. Firewalls can be configured to filter out
                 applets, scripts, and components so that they are removed from an HTML docu-



                                                                              www.syngress.com
   316   317   318   319   320   321   322   323   324   325   326