0%

Book Description

Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company’s vulnerabilities to common web application security threats, such as malicious bots, application exploits, API attacks, DDoS attacks, and server-based malware. You’ll learn proactive steps to implement services and strategies designed to protect online enterprise applications at the user edge.

Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors.

  • Understand the current web application threats landscape
  • Prioritize availability, confidentiality, and integrity and manage associated security risks
  • Explore the role of DNS in maintaining availability
  • Learn how to approach cloud-based web application security
  • Plan your strategy with a web application security checklist

Table of Contents

  1. 1. Introduction
  2. 2. Threats Targeting Your Web Applications
    1. Malicious Bots
    2. DDoS Attacks
    3. Malware
    4. Application Vulnerabilities
    5. APIs and Mobile Application Risks
  3. 3. Malicious Bots Threatening Web Applications
    1. Everyday Bot Attacks and High-Profile Examples
      1. Credential Stuffing
      2. Denial-of-Inventory
      3. Mirai
    2. Industries Facing Malicious Bot Targeting
      1. Travel Industry
      2. Retailers
  4. 4. Prioritizing Your Web Application Security Defenses
    1. Availability
    2. Data Confidentiality
    3. Data Integrity
  5. 5. Maintaining Availability: A DNS-Based Approach
    1. DDoS Mitigation
    2. Active Failover
    3. Performance and Responsiveness Assurance
  6. 6. Managing Threats to Data Confidentiality and Integrity
    1. Bot Management
    2. Cloud-Based WAF
    3. Cloud-Based Malware Detection
    4. API Security
  7. 7. Web Application Security: Planning Your Next Move
    1. The Benefits of Teaming with an Edge Services Partner
    2. What a Web Application Security Suite Looks Like
3.133.109.211