By Topic

Secure use of the World Wide Web: keeping browsers and servers from getting snared

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Pescatore, J. ; Trusted Inf. Syst. Inc., Rockville, MD, USA

Use of the World Wide Web has exploded in industry, with browsers on every desktop and a server in every division. The use of WWW technology for internal information networks (intranets) has further accelerated business dependence on WWW software. The architecture of the WWW was designed to support sharing of information, and it offers businesses a way to do so at an attractively low cost of ownership. However, there is still no such thing as a free lunch. Web servers and browsers have many vulnerabilities that make it easy for the wrong people to get access to sensitive business information. In addition, since software product life cycles have dropped to six months or shorter, new versions of WWW software products are rushed to market without a level of testing sufficient to assure secure operation. This TIS Trusted Bulletin provides guidelines for secure business use of the World Wide Web

Published in:

Northcon/96

Date of Conference:

4-6 Nov 1996