Plane model (computer science)

from Wikipedia, the free encyclopedia

A level model is used to assign the responsibilities of the relevant organizational areas to the individual subtasks in the security conception and implementation of web applications. The starting point is a subdivision into 6 levels (level 0 to level 5):

level Content (short version) Responsible Expertise
5 semantics Protection against deception and fraud Headquarters Corporate identity and corporate communication
4th logic Securing processes and workflows as a whole Client Knowledge of business processes
3 implementation Avoiding programming errors that lead to weak points Developer (implementer) Software development
2 technology Correct choice and safe use of technology Specialist developer, IT operations General IT security
1 system Securing the software used on the system platform IT operations Network and system administration
0 Network & host Protection of host and network

Levels

Level 0 - network and host

The level of network, server - hardware and running on the operating system is assigned here not directly the security of the web application. Rather, this level follows at the bottom. The implementation of basic security measures at this level is nevertheless regarded as a mandatory requirement for secure web applications.

Level 1 - system level

At the system level, all those programs are considered that are required for the functioning of the entire web application. This includes the web server and the application server , but also database and backend systems. These components must be included in the security design of a web application and set accordingly.

Level 2 - technology

This level of technology relates to the use of the right technology for the respective purpose and protection requirement, as well as its correct use. So z. B. a web application that transfers sensitive data unencrypted over the Internet is not using the right technology. A web application that encrypts passwords but uses a key that is too short may be using the right technology incorrectly.

Level 3 - implementation

The implementation level includes the area of ​​unintentional program errors ( bugs ), but also nonexistent or inadequate checking of input data ( data validation ). This level also includes inadequate test procedures and the neglect of quality assurance, for example for reasons of cost.

Level 4 - logic

This level affects both the logic of the processes within a web application and the interaction with the user. If this is implemented too 'purposefully', there may be a possibility of abuse. If, for example, the corresponding user ID is blocked to prevent a password from being entered repeatedly after the fifth incorrect login attempt, this user could be specifically blocked out by a third party, provided no further measures are taken. This abusive practice is further facilitated if the user ID is easy to guess.

Level 5 - semantics

The semantic level includes content-related and communication-related aspects. It creates the context of trust for interacting with a user. If a great deal of care is not taken in this area, a web application can be misused by a third party in order to deceive a user. This area can rarely be limited to a single application. Rather, a cross-website or cross-company view is necessary. Abuse opportunities that make use of errors on the semantic level are social engineering , phishing , identity theft, etc.

See also

literature

  • Hacking Exposed: Web Applications: Web Application Security Secrets and Solutions by Joel Scambray, Vincent Liu and Caleb Sima at Mcgraw-Hill Professional; 3. Edition. (November 1, 2010); ISBN 978-0071740647

Individual evidence