Authentication User Name Passworrd Biometric Spam - Phising Spoof Authorization
Authentication User Name Passworrd Biometric Spam - Phising Spoof Authorization
User name
Passworrd
Biometric
Spam Phising
Spoof
Authorization
Authorization addresses the question: what can you do? It is the process that
governs the resources and operations that the authenticated client is permitted
to access. Resources include files, databases, tables, rows, and so on, together
with system-level resources such as registry keys and configuration data.
Operations include performing transactions such as purchasing a product,
transferring money
from one account to another, or increasing a customers credit rating.
Availability
Firewall Denial of Service
Backup
Virus
Worm
Disaster Recovery Site
Redundancy
Load Balancing
Caching
From a security perspective, availability means that systems remain available for
legitimate users. The goal for many attackers with denial of service attacks is to
crash an application or to make sure that it is sufficiently overwhelmed so that
other users cannot access the application.
Confidentiality
Confidentiality, also referred to as privacy, is the process of making sure that
data
remains private and confidential, and that it cannot be viewed by unauthorized
users or eavesdroppers who monitor the flow of traffic across a network.
Encryption is frequently used to enforce confidentiality. Access control lists (ACLs)
are another means of enforcing confidentiality.
Chapter 1: Web Application Security Fundamentals 5