Database and Application Security

A Practitioner's Guide

Paperback Engels 2024 9780138073732
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

An all-encompassing guide to securing your database and applications against costly cyberattacks!

 

In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. Database and Application Security: A Practitioner's Guide is the resource you need to better fight cybercrime and become more marketable in an IT environment that is short on skilled cybersecurity professionals.

 

In this extensive and accessible guide, Dr. R. Sarma Danturthi provides a solutions-based approach to help you master the tools, processes, and methodologies to establish security inside application and database environments. It discusses the STIG requirements for third-party applications and how to make sure these applications comply to an organization’s security posture. From securing hosts and creating firewall rules to complying with increasingly tight regulatory requirements, this book will be your go-to resource to creating an ironclad cybersecurity database.

 

In this guide, you'll find: Tangible ways to protect your company from data breaches, financial loss, and reputational harm Engaging practice questions (and answers) after each chapter to solidify your understanding Key information to prepare for certifications such as Sec+, CISSP, and ITIL Sample scripts for both Oracle and SQL Server software and tips to secure your code Advantages of DB back-end scripting over front-end hard coding to access DB Processes to create security policies, practice continuous monitoring, and maintain proactive security postures

Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Specificaties

ISBN13:9780138073732
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Foreword &nbsp;&nbsp;&nbsp;xvi</p> <p>Introduction &nbsp;&nbsp;&nbsp;&nbsp;xvii</p> <p>&nbsp;</p> <p><strong>Part I. Security Fundamentals</strong></p> <p><strong>&nbsp;</strong></p> <p><strong>Chapter 1. Basics of Cybersecurity</strong> &nbsp;&nbsp;&nbsp;&nbsp;1</p> <p>Cybersecurity &nbsp;&nbsp;&nbsp;&nbsp;1</p> <p>CIA-DAD &nbsp;&nbsp;&nbsp;&nbsp;2</p> <p>I-A-A-A &nbsp;&nbsp;&nbsp;&nbsp;4</p> <p>Defense in Depth &nbsp;&nbsp;&nbsp;&nbsp;6</p> <p>Hardware and Software Security &nbsp;&nbsp;&nbsp;&nbsp;7</p> <p>Firewalls, Access Controls, and Access Control Lists &nbsp;&nbsp;&nbsp;&nbsp;8</p> <p>Physical Security &nbsp;&nbsp;&nbsp;&nbsp;9</p> <p>Practical Example of a Server Security in an Organization &nbsp;&nbsp;&nbsp;&nbsp;10</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;16</p> <p>Chapter 1 Questions &nbsp;&nbsp;&nbsp;&nbsp;17</p> <p>Answers to Chapter 1 Questions &nbsp;&nbsp;&nbsp;&nbsp;18</p> <p>&nbsp;</p> <p><strong>Chapter 2. Security Details</strong> &nbsp;&nbsp;&nbsp;&nbsp;19</p> <p>The Four Attributes: Encrypt, Compress, Index, and Archive &nbsp;&nbsp;&nbsp;&nbsp;19</p> <p>Encryption, Algorithms &nbsp;&nbsp;&nbsp;&nbsp;22</p> <p>Public Key Infrastructure &nbsp;&nbsp;&nbsp;&nbsp;22</p> <p>Email Security Example &nbsp;&nbsp;&nbsp;&nbsp;23</p> <p>Nonrepudiation, Authentication Methods (K-H-A) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;25</p> <p>Current and New Algorithms &nbsp;&nbsp;&nbsp;&nbsp;26</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;26</p> <p>Chapter 2 Questions &nbsp;&nbsp;&nbsp;&nbsp;28</p> <p>Answers to Chapter 2 Questions &nbsp;&nbsp;&nbsp;&nbsp;29</p> <p>&nbsp;</p> <p><strong>Chapter 3. Goals of Security</strong> &nbsp;&nbsp;&nbsp;&nbsp;31</p> <p>Goals of Security—SMART/OKR &nbsp;&nbsp;&nbsp;&nbsp;31</p> <p>Who’s Who in Security: RACI &nbsp;&nbsp;&nbsp;&nbsp;33</p> <p>Creating the RACI Matrix &nbsp;&nbsp;&nbsp;&nbsp;35</p> <p>Planning—Strategic, Tactical, and Operational &nbsp;&nbsp;&nbsp;&nbsp;36</p> <p>Events and Incidents &nbsp;&nbsp;&nbsp;&nbsp;37</p> <p>Risks, Breaches, Fixes &nbsp;&nbsp;&nbsp;&nbsp;38</p> <p>Security Logs—The More the Merrier &nbsp;&nbsp;&nbsp;&nbsp;39</p> <p>Re/Engineering a Project &nbsp;&nbsp;&nbsp;&nbsp;41</p> <p>Keeping Security Up to Date &nbsp;&nbsp;&nbsp;&nbsp;42</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;43</p> <p>Chapter 3 Questions &nbsp;&nbsp;&nbsp;&nbsp;44</p> <p>Answers to Chapter 3 Questions &nbsp;&nbsp;&nbsp;&nbsp;45</p> <p>&nbsp;</p> <p><strong>Part II. Database Security—The Back End</strong></p> <p>&nbsp;</p> <p><strong>Chapter 4. Database Security Introduction</strong> &nbsp;&nbsp;&nbsp;&nbsp;47</p> <p>ACID, BASE of DB, and CIA Compliance &nbsp;&nbsp;&nbsp;&nbsp;47</p> <p>ACID, BASE, and CIA &nbsp;&nbsp;&nbsp;&nbsp;47</p> <p>Data in Transit, Data at Rest &nbsp;&nbsp;&nbsp;&nbsp;49</p> <p>DDL and DML &nbsp;&nbsp;&nbsp;&nbsp;52</p> <p>Designing a Secure Database &nbsp;&nbsp;&nbsp;&nbsp;54</p> <p>Structural Security &nbsp;&nbsp;&nbsp;&nbsp;57</p> <p>Functional Security &nbsp;&nbsp;&nbsp;&nbsp;60</p> <p>Data Security &nbsp;&nbsp;&nbsp;&nbsp;61</p> <p>Procedural Security &nbsp;&nbsp;&nbsp;&nbsp;63</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;64</p> <p>Chapter 4 Questions &nbsp;&nbsp;&nbsp;&nbsp;65</p> <p>Answers to Chapter 4 Questions &nbsp;&nbsp;&nbsp;&nbsp;66</p> <p>&nbsp;</p> <p><strong>Chapter 5. Access Control of Data</strong> &nbsp;&nbsp;&nbsp;&nbsp;67</p> <p>Access Control—Roles for Individuals and Applications &nbsp;&nbsp;&nbsp;&nbsp;67</p> <p>MAC, DAC, RBAC, RuBAC &nbsp;&nbsp;&nbsp;&nbsp;69</p> <p>Passwords, Logins, and Maintenance &nbsp;&nbsp;&nbsp;&nbsp;74</p> <p>Hashing and Checksum Methods &nbsp;&nbsp;&nbsp;&nbsp;76</p> <p>Locking, Unlocking, Resetting &nbsp;&nbsp;&nbsp;&nbsp;80</p> <p>Monitoring User Accounts, System Account &nbsp;&nbsp;&nbsp;&nbsp;82</p> <p>Data Protection—Views and Materialized Views &nbsp;&nbsp;&nbsp;&nbsp;86</p> <p>PII Security—Data, Metadata, and Surrogates &nbsp;&nbsp;&nbsp;&nbsp;90</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;94</p> <p>Chapter 5 Questions &nbsp;&nbsp;&nbsp;&nbsp;96</p> <p>Answers to Chapter 5 Questions &nbsp;&nbsp;&nbsp;&nbsp;97</p> <p>&nbsp;</p> <p><strong>Chapter 6. Data Refresh, Backup, and Restore</strong> &nbsp;&nbsp;&nbsp;&nbsp;99</p> <p>Data Refresh—Manual, ETL, and Script &nbsp;&nbsp;&nbsp;&nbsp;99</p> <p>ETL Jobs &nbsp;&nbsp;&nbsp;&nbsp;102</p> <p>Security in Invoking ETL Job &nbsp;&nbsp;&nbsp;&nbsp;104</p> <p>Data Pump: Exporting and Importing &nbsp;&nbsp;&nbsp;&nbsp;106</p> <p>Backup and Restore &nbsp;&nbsp;&nbsp;&nbsp;109</p> <p>Keeping Track—Daily, Weekly, Monthly &nbsp;&nbsp;&nbsp;&nbsp;117</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;119</p> <p>Chapter 6 Questions &nbsp;&nbsp;&nbsp;&nbsp;120</p> <p>Answers to Chapter 6 Questions &nbsp;&nbsp;&nbsp;&nbsp;121</p> <p>&nbsp;</p> <p><strong>Chapter 7. Host Security</strong> &nbsp;&nbsp;&nbsp;&nbsp;123</p> <p>Server Connections and Separation &nbsp;&nbsp;&nbsp;&nbsp;123</p> <p>IP Selection, Proxy, Invited Nodes &nbsp;&nbsp;&nbsp;&nbsp;126</p> <p>Access Control Lists &nbsp;&nbsp;&nbsp;&nbsp;128</p> <p>Connecting to a System/DB: Passwords, Smart Cards, Certificates &nbsp;&nbsp;&nbsp;&nbsp;131</p> <p>Cron Jobs or Task Scheduler &nbsp;&nbsp;&nbsp;&nbsp;137</p> <p>Regular Monitoring and Troubleshooting &nbsp;&nbsp;&nbsp;&nbsp;141</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;144</p> <p>Chapter 7 Questions &nbsp;&nbsp;&nbsp;&nbsp;145</p> <p>Answers to Chapter 7 Questions &nbsp;&nbsp;&nbsp;&nbsp;146</p> <p>&nbsp;</p> <p><strong>Chapter 8. Proactive Monitoring</strong> &nbsp;&nbsp;&nbsp;&nbsp;149</p> <p>Logs, Logs, and More Logs &nbsp;&nbsp;&nbsp;&nbsp;149</p> <p>Data Manipulation Monitoring &nbsp;&nbsp;&nbsp;&nbsp;150</p> <p>Data Structure Monitoring &nbsp;&nbsp;&nbsp;&nbsp;156</p> <p>Third-Party or Internal Audits &nbsp;&nbsp;&nbsp;&nbsp;159</p> <p>LOG File Generation &nbsp;&nbsp;&nbsp;&nbsp;165</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;172</p> <p>Chapter 8 Questions &nbsp;&nbsp;&nbsp;&nbsp;173</p> <p>LAB Work &nbsp;&nbsp;&nbsp;&nbsp;173</p> <p>Answers to Chapter 8 Questions &nbsp;&nbsp;&nbsp;&nbsp;174</p> <p>&nbsp;</p> <p><strong>Chapter 9. Risks, Monitoring, and Encryption</strong> &nbsp;&nbsp;&nbsp;&nbsp;175</p> <p>Security Terms &nbsp;&nbsp;&nbsp;&nbsp;175</p> <p>Risk, Mitigation, Transfer, Avoidance, and Ignoring &nbsp;&nbsp;&nbsp;&nbsp;177</p> <p>Organized Database Monitoring &nbsp;&nbsp;&nbsp;&nbsp;181</p> <p>Encrypting the DB: Algorithm Choices &nbsp;&nbsp;&nbsp;&nbsp;183</p> <p>Automated Alerts &nbsp;&nbsp;&nbsp;&nbsp;185</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;186</p> <p>Chapter 9 Questions &nbsp;&nbsp;&nbsp;&nbsp;187</p> <p>Answers to Chapter 9 Questions &nbsp;&nbsp;&nbsp;&nbsp;188</p> <p>&nbsp;</p> <p><strong>Part III. Application Security—The Front End</strong></p> <p>&nbsp;</p> <p><strong>Chapter 10. Application Security Fundamentals</strong> &nbsp;&nbsp;&nbsp;&nbsp;189</p> <p>Coding Standards &nbsp;&nbsp;&nbsp;&nbsp;190</p> <p>The Software Development Process &nbsp;&nbsp;&nbsp;&nbsp;195</p> <p>Models and Selection &nbsp;&nbsp;&nbsp;&nbsp;199</p> <p>Cohesion and Coupling &nbsp;&nbsp;&nbsp;&nbsp;201</p> <p>Development, Test, and Production &nbsp;&nbsp;&nbsp;&nbsp;202</p> <p>Client and Server &nbsp;&nbsp;&nbsp;&nbsp;204</p> <p>Side Effects of a Bad Security in Software &nbsp;&nbsp;&nbsp;&nbsp;213</p> <p>Fixing the SQL Injection Attacks &nbsp;&nbsp;&nbsp;&nbsp;213</p> <p>Evaluate User Input &nbsp;&nbsp;&nbsp;&nbsp;214</p> <p>Do Back-End Database Checks &nbsp;&nbsp;&nbsp;&nbsp;215</p> <p>Change Management—Speaking the Same Language &nbsp;&nbsp;&nbsp;&nbsp;215</p> <p>Secure Logging In to Applications, Access to Users &nbsp;&nbsp;&nbsp;&nbsp;217</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;221</p> <p>Chapter 10 Questions &nbsp;&nbsp;&nbsp;&nbsp;223</p> <p>Answer to Chapter 10 Questions &nbsp;&nbsp;&nbsp;&nbsp;224</p> <p>&nbsp;</p> <p><strong>Chapter 11. The Unseen Back End</strong> &nbsp;&nbsp;&nbsp;&nbsp;227</p> <p>Back-End DB Connections in Java/Tomcat &nbsp;&nbsp;&nbsp;&nbsp;238</p> <p>Connection Strings and Passwords in Code &nbsp;&nbsp;&nbsp;&nbsp;241</p> <p>Stored Procedures and Functions &nbsp;&nbsp;&nbsp;&nbsp;242</p> <p>File Encryption, Types, and Association &nbsp;&nbsp;&nbsp;&nbsp;247</p> <p>Implementing Public Key Infrastructure and Smart Card &nbsp;&nbsp;&nbsp;&nbsp;250</p> <p>Examples of Key Pairs on Java and Linux &nbsp;&nbsp;&nbsp;&nbsp;251</p> <p>Symmetric Encryption &nbsp;&nbsp;&nbsp;&nbsp;253</p> <p>Asymmetric Encryption &nbsp;&nbsp;&nbsp;&nbsp;254</p> <p>Vulnerabilities, Threats, and Web Security &nbsp;&nbsp;&nbsp;&nbsp;255</p> <p>Attack Types and Mitigations &nbsp;&nbsp;&nbsp;&nbsp;256</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;260</p> <p>Chapter 11 Questions &nbsp;&nbsp;&nbsp;&nbsp;261</p> <p>Answers to Chapter 11 Questions &nbsp;&nbsp;&nbsp;&nbsp;262</p> <p>&nbsp;</p> <p><strong>Chapter 12. Securing Software—In-House and Vendor</strong> &nbsp;&nbsp;&nbsp;&nbsp;263</p> <p>Internal Development Versus Vendors &nbsp;&nbsp;&nbsp;&nbsp;263</p> <p>Vendor or COTS Software &nbsp;&nbsp;&nbsp;&nbsp;264</p> <p>Action Plan &nbsp;&nbsp;&nbsp;&nbsp;265</p> <p>In-House Software Development &nbsp;&nbsp;&nbsp;&nbsp;266</p> <p>Initial Considerations for In-House Software &nbsp;&nbsp;&nbsp;&nbsp;267</p> <p>Code Security Check &nbsp;&nbsp;&nbsp;&nbsp;269</p> <p>Fixing the Final Product—SAST Tools &nbsp;&nbsp;&nbsp;&nbsp;271</p> <p>Fine-tuning the Product—Testing and Release &nbsp;&nbsp;&nbsp;&nbsp;277</p> <p>Patches and Updates &nbsp;&nbsp;&nbsp;&nbsp;278</p> <p>Product Retirement/Decommissioning &nbsp;&nbsp;&nbsp;&nbsp;280</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;282</p> <p>Chapter 12 Questions &nbsp;&nbsp;&nbsp;&nbsp;283</p> <p>Answers to Chapter 12 Questions &nbsp;&nbsp;&nbsp;&nbsp;284</p> <p>&nbsp;</p> <p><strong>Part IV. Security Administration</strong></p> <p>&nbsp;</p> <p><strong>Chapter 13. Security Administration</strong> &nbsp;&nbsp;&nbsp;&nbsp;287</p> <p>Least Privilege, Need to Know, and Separation of Duties &nbsp;&nbsp;&nbsp;&nbsp;287</p> <p>Who Is Who and Why &nbsp;&nbsp;&nbsp;&nbsp;290</p> <p>Scope or User Privilege Creep &nbsp;&nbsp;&nbsp;&nbsp;292</p> <p>Change Management &nbsp;&nbsp;&nbsp;&nbsp;294</p> <p>Documenting the Process &nbsp;&nbsp;&nbsp;&nbsp;296</p> <p>Legal Liabilities &nbsp;&nbsp;&nbsp;&nbsp;308</p> <p>Software Analysis &nbsp;&nbsp;&nbsp;&nbsp;312</p> <p>Network Analysis &nbsp;&nbsp;&nbsp;&nbsp;312</p> <p>Hardware or a Device Analysis &nbsp;&nbsp;&nbsp;&nbsp;313</p> <p>Be Proactive—Benefits and Measures &nbsp;&nbsp;&nbsp;&nbsp;314</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;318</p> <p>Chapter 13 Questions &nbsp;&nbsp;&nbsp;&nbsp;319</p> <p>Answers to Chapter 13 Questions &nbsp;&nbsp;&nbsp;&nbsp;320</p> <p>&nbsp;</p> <p><strong>Chapter 14. Follow a Proven Path for Security</strong> &nbsp;&nbsp;&nbsp;&nbsp;323</p> <p>Advantages of Security Administration &nbsp;&nbsp;&nbsp;&nbsp;323</p> <p>Penetration Testing &nbsp;&nbsp;&nbsp;&nbsp;325</p> <p>Penetration Test Reports &nbsp;&nbsp;&nbsp;&nbsp;334</p> <p>Audits—Internal and External and STIG Checking &nbsp;&nbsp;&nbsp;&nbsp;337</p> <p>OPSEC—The Operational Security &nbsp;&nbsp;&nbsp;&nbsp;344</p> <p>Digital Forensics—Software Tools &nbsp;&nbsp;&nbsp;&nbsp;346</p> <p>Lessons Learned/Continuous Improvement &nbsp;&nbsp;&nbsp;&nbsp;349</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;350</p> <p>Chapter 14 Questions &nbsp;&nbsp;&nbsp;&nbsp;352</p> <p>Answers to Chapter 14 Questions &nbsp;&nbsp;&nbsp;&nbsp;353</p> <p>&nbsp;</p> <p><strong>Chapter 15. Mobile Devices and Application Security</strong> &nbsp;&nbsp;&nbsp;&nbsp;355</p> <p>Authentication &nbsp;&nbsp;&nbsp;&nbsp;356</p> <p>Cryptography &nbsp;&nbsp;&nbsp;&nbsp;359</p> <p>Code Quality and Injection Attacks &nbsp;&nbsp;&nbsp;&nbsp;360</p> <p>User Privacy on the Device &nbsp;&nbsp;&nbsp;&nbsp;360</p> <p>Descriptive Claims &nbsp;&nbsp;&nbsp;&nbsp;361</p> <p>Secure Software Development Claims &nbsp;&nbsp;&nbsp;&nbsp;361</p> <p>Sandboxing &nbsp;&nbsp;&nbsp;&nbsp;363</p> <p>Mobile Applications Security Testing &nbsp;&nbsp;&nbsp;&nbsp;364</p> <p>NIST’s Directions for Mobile Device Security &nbsp;&nbsp;&nbsp;&nbsp;366</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;370</p> <p>Chapter 15 Questions &nbsp;&nbsp;&nbsp;&nbsp;372</p> <p>Answers to Chapter 15 Questions &nbsp;&nbsp;&nbsp;&nbsp;373</p> <p>&nbsp;</p> <p><strong>Chapter 16. Corporate Security in Practice</strong> &nbsp;&nbsp;&nbsp;&nbsp;375</p> <p>Case # 1: A Person Is Joining an Organization as a New Employee &nbsp;&nbsp;&nbsp;&nbsp;378</p> <p>Case # 2: An Employee Is Fired or Is Voluntarily Leaving the Organization &nbsp;&nbsp;&nbsp;&nbsp;382</p> <p>Case # 3: An Existing Employee Wants to Renew Their Credentials &nbsp;&nbsp;&nbsp;&nbsp;383</p> <p>Case # 4: An Existing Employee’s Privileges Are Increased/Decreased &nbsp;&nbsp;&nbsp;&nbsp;383</p> <p>Case # 5: A Visitor/Vendor to the Organizational Facility &nbsp;&nbsp;&nbsp;&nbsp;384</p> <p>Physical Security of DB and Applications &nbsp;&nbsp;&nbsp;&nbsp;385</p> <p>Business Continuity and Disaster Recovery &nbsp;&nbsp;&nbsp;&nbsp;388</p> <p>Attacks and Loss—Recognizing and Remediating &nbsp;&nbsp;&nbsp;&nbsp;390</p> <p>Recovery and Salvage &nbsp;&nbsp;&nbsp;&nbsp;393</p> <p>Getting Back to Work &nbsp;&nbsp;&nbsp;&nbsp;394</p> <p>Lessons Learned from a Ransomware Attack—Example from a ISC2 Webinar &nbsp;&nbsp;&nbsp;&nbsp;399</p> <p>Summary &nbsp;&nbsp;&nbsp;&nbsp;403</p> <p>Chapter 16 Questions &nbsp;&nbsp;&nbsp;&nbsp;404</p> <p>Answers to Chapter 16 Questions &nbsp;&nbsp;&nbsp;&nbsp;405</p> <p>&nbsp;</p> <p>References&nbsp; &nbsp; 407</p> <p>&nbsp;</p> <p>Index&nbsp;&nbsp;&nbsp;411</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Database and Application Security