0%

Book Description

Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today’s major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks.

Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings—a threat landscape as big and diverse as the internet itself. You’ll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts.

  • Get an overview of today’s top cyberthreats and their impact on businesses
  • Protect web applications from evolving threats using an integrated approach
  • Use industry guidelines to help prevent injection, XSS, and session hijacking attacks
  • Learn why companies are moving threat protection to third-party entities and the cloud
  • Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics

Table of Contents

  1. Preface
  2. 1. Today’s Threat Landscape
    1. How We Got Here
    2. Cybersecurity Experts Respond to the Growing Threats
    3. Current Top Threats to Web Applications
      1. Bots and Botnets
      2. Ecommerce Shopping Cart and Credit Card Fraud
      3. Price Scraping
      4. Click Fraud
      5. Distributed Denial-of-Service Attacks
      6. Credential Stuffing
    4. Other Common Web-Based Attacks
      1. SQL Injection
      2. Cross-Site Scripting
      3. Trusted User Session Hijacking
    5. Threats and Impacts to Business
    6. Conclusion
  3. 2. Threat Protection Strategies
    1. The Security Operations Center
    2. Web Application Firewalls
    3. Bot Management Solutions
    4. An Integrated Approach
    5. Conclusion
  4. 3. Threat Prevention Technology
    1. Artificial Intelligence and Machine Learning
    2. Prevention and Mitigation Methods for Web-Based Attacks
      1. Injection Prevention and Mitigation
      2. Cross-Site Scripting Prevention and Mitigation
      3. Session Hijacking Prevention and Mitigation
    3. Conclusion
  5. 4. Next Steps for Businesses
    1. Moving to the Cloud
    2. Third-Party Outsourcing
    3. Conclusion
3.138.138.144