Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 17– Attacking Application Architecture Hareesh Lingareddy.

Similar presentations


Presentation on theme: "Chapter 17– Attacking Application Architecture Hareesh Lingareddy."— Presentation transcript:

1 Chapter 17– Attacking Application Architecture Hareesh Lingareddy

2  Tiered Architectures  Attacking Tiered  Securing Tiered  Cloud  Attacking Cloud  Securing Cloud

3  Multitier architecture common 3-tier architecture  Advantages Reuse Parallel work

4  Exploiting Trust Relationships Application tier Programming errors  Subverting Other Tiers Using file read access to extract MySQL data  Limited Compromise

5  Minimize Trust Relationships Role-based access controls Usage of various accounts  Segregate Different Components Limited access to files Filtered network level access  All Defense in Depth Encrypting sensitive data

6

7

8  Possible sections of attack Governance Data Architecture Applications Assurance  Token based access  Web storage

9  Secure Customer Access Robust authentication Privilege based access  Segregate Customer Functionality

10

11


Download ppt "Chapter 17– Attacking Application Architecture Hareesh Lingareddy."

Similar presentations


Ads by Google