Web application security - the fast guide 1.1 | Page 14
Chapter 1 - information Security overview
Application
P a g e | 14
proxy
Requests
Figure 4: isolate the application using proxy
Even though the presented approaches are categorized in different classes but a
hybrid use can be applied sometimes depending of the nature of application.
1.3 Layered Security
Attacker
Network Layer
Platform Layer
Application Layer
Data Layer
Attacker
Response
Layer
Figure 5: layers based security
One of the most efficient ways to deal with security issues in general and
informatio n security in specific is to apply a layered based model in order to be
able to understand threats and apply necessary countermeasures for it.
What makes this model suitable for security is the architecture of network and
information systems nowadays where most of the interactions are between
users and information systems through the network as a set of requests sent
from the beneficiary to the server that will handle the request, process any sent
information, retrieve or manipulate data.in that context the data become the core
of model as it is the main important asset that need to be protected.
Many models were created to embody the layered security approach from
different perspectives.
Some models took in consideration the security policy and user dimension and
other focus more on the main layers: