CISSP Server-Based Systems – Bk1D3T5St2
In this section we shall consider the security related to server-based systems other than web servers (which are covered below in the “Assess and Mitigate Vulnerabilities in Web- Based Systems” section). Server vulnerabilities mirror many of the same vulnerabilities described above, just from the server’s perspective. The server needs to validate the identity of the client and/or the identity of the user of the client. This can be done using a combination of Identity and …