Page 324 - StudyBook.pdf
P. 324

308    Chapter 5 • Communication Security: Web Based Services

             such as buffer overflows, which might have been missed if the code had been made
             available on the site. It is best to use a server dedicated to testing only.This server
             should have the same applications and configurations as the actual Web server and
             should not be connected to the production network.



              NOTE
                  Any programs and scripts available on your site should be thoroughly
                  tested before they are made available for use on the Web. Determine
                  whether the script or program works properly by using it numerous
                  times. If you are using a database, enter and retrieve multiple records.
                  You should also consider having one or more members of your IT staff
                  try the script or program themselves, because this will allow you to ana-
                  lyze the effectiveness of the program with fresh eyes. They may enter
                  data in a different order or perform a task differently, causing
                  unwanted results.





             Code Signing: Solution or More Problems?

             As we mentioned earlier in this chapter, code signing addresses the need for users
             to trust the code they download and then load into their computer’s memory.After
             all, without knowing who provided the software, or whether it was altered after
             being distributed, malicious code could be added to a component and used to
             attack a user’s computer.
                 Digital certificates can be used to sign the code and to authenticate that the
             code has not been tampered with, and that it is indeed the identical file distributed
             by its creator.The digital certificate consists of a set of credentials for verifying
             identity and integrity.The certificate is issued by a certification authority and con-
             tains a name, serial number, expiration date, copy of the certificate holder’s public
             key, and a digital signature belonging to the CA.The elements of the certificate are
             used to guarantee that the file is valid.



              NOTE
                  For more information about how digital certificates work, see Chapter
                  10, “Public Key Infrastructure.”





          www.syngress.com
   319   320   321   322   323   324   325   326   327   328   329