Week 3: Web Security

Now we move away from low-level security and turn our attention to security on the worldwide web (WWW).

The web utilizes a variety of technologies, from HTTP (hypertext transfer protocol) and HTML (hypertext markup language) to SQL (standard query language) and the Javascript programming language. Unfortunately, these technologies can be used in ways that constitute significant vulnerabilities. We will examine several important kinds of vulnerabilities, see how they can be exploited, and explore how to defend against them.

Learning Objectives

After the completion of this week's material, you will be able to:

Video Lectures

Break out: Interview with Kevin Haley

In March 2015, Mike had the pleasure of interviewing Kevin Haley. Kevin was a Director of Symantec Security Response. In this interview we discussed the state of cybersecurity at that time: the trends, the hacks, and the situations that define the state of play in which technology developers and users find themselves. The interview is optional from an assessment perspective -- there will no quiz questions on it. We hope you find it interesting!

Mike Hicks interviews Kevin Haley (21:13). Highlights, indexed by time:

Readings

No readings are required for this week, but you may find the following references helpful.

Quiz

The quiz for this week covers all of the material for this week. You must submit the quiz no later than the start of week 5.

Project

The second project tests your ability to exploit vulnerabilities in a web application called BadStore. It is due in three weeks, at the start of week 6. You will complete the work for the project on your own computer, and then take the on-line assessment to show that you've done so.