Journal of Information Security

Volume 4, Issue 3 (July 2013)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Web Security and Log Management: An Application Centric Perspective

HTML  XML Download Download as PDF (Size: 105KB)  PP. 138-143  
DOI: 10.4236/jis.2013.43016    4,588 Downloads   7,950 Views  Citations

ABSTRACT

The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks continue to plague the Internet. We discuss risks that affect web applications and explain how network-centric and host-centric techniques, as much as they are crucial in an enterprise, lack necessary depth to comprehensively analyze overall application security. The nature of web applications to span a number of servers introduces a new dimension of security requirement that calls for a holistic approach to protect the information asset regardless of its physical or logical separation of modules and tiers. We therefore classify security mechanisms as either infrastructure-centric or application-centric based on what asset is being secured. We then describe requirements for such application-centric security mechanisms.

Share and Cite:

A. Kahonge, W. Okello-Odongo, E. Miriti and E. Abade, "Web Security and Log Management: An Application Centric Perspective," Journal of Information Security, Vol. 4 No. 3, 2013, pp. 138-143. doi: 10.4236/jis.2013.43016.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.