Summary
We saw in Chapter 1 that the term information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to ensure confidentiality, integrity, and availability. Related to this, we have seen how an application can identify and authenticate entities using the three factors based on knowledge, ownership, and inherence to control the access of protected application resources from unauthorized entities. Also, we examined how cryptography can help ensure the two important aspects of message security: confidentiality through encryption and integrity through digital signing techniques. We also looked at transport security achieved through TLS over HTTP (HTTPS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2013 Badrinarayanan Lakshmiraghavan
About this chapter
Cite this chapter
Lakshmiraghavan, B. (2013). Security Vulnerabilities. In: Pro ASP.NET Web API Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-5783-7_15
Download citation
DOI: https://doi.org/10.1007/978-1-4302-5783-7_15
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-5782-0
Online ISBN: 978-1-4302-5783-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)