SlideShare una empresa de Scribd logo
1 de 142
Descargar para leer sin conexión
Special Publication 800-44
                             Version 2




Guidelines on Securing Public
Web Servers

Recommendations of the National Institute of
Standards and Technology


Miles Tracy
Wayne Jansen
Karen Scarfone
Theodore Winograd
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers
Security Web Servers

Más contenido relacionado

La actualidad más candente

A Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTA Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTDavid Sweigert
 
20150616 NPO要知道的駭客攻擊手法
20150616 NPO要知道的駭客攻擊手法20150616 NPO要知道的駭客攻擊手法
20150616 NPO要知道的駭客攻擊手法Net Tuesday Taiwan
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay Dean Kay
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Sal Velasco
 
Implementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoringImplementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoringSinthana Sambandam
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data WorkflowOPSWAT
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 

La actualidad más candente (10)

A Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTA Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERT
 
20150616 NPO要知道的駭客攻擊手法
20150616 NPO要知道的駭客攻擊手法20150616 NPO要知道的駭客攻擊手法
20150616 NPO要知道的駭客攻擊手法
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
 
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
Case Study: Samsung's Galaxy S4 smartphone on the Google Android Platform, Kn...
 
Implementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoringImplementation of Wireless Sensor Network in disaster detection and monitoring
Implementation of Wireless Sensor Network in disaster detection and monitoring
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 

Destacado

Securing Web Server Ibm
Securing Web Server IbmSecuring Web Server Ibm
Securing Web Server IbmAung Khant
 
Security Engineering Executive
Security Engineering ExecutiveSecurity Engineering Executive
Security Engineering ExecutiveAung Khant
 
Session Fixation
Session FixationSession Fixation
Session FixationAung Khant
 
Security Testing Web App
Security Testing Web AppSecurity Testing Web App
Security Testing Web AppAung Khant
 
Security Engineeringwith Patterns
Security Engineeringwith PatternsSecurity Engineeringwith Patterns
Security Engineeringwith PatternsAung Khant
 

Destacado (6)

Securing Web Server Ibm
Securing Web Server IbmSecuring Web Server Ibm
Securing Web Server Ibm
 
Security Engineering Executive
Security Engineering ExecutiveSecurity Engineering Executive
Security Engineering Executive
 
Session Fixation
Session FixationSession Fixation
Session Fixation
 
Security Testing Web App
Security Testing Web AppSecurity Testing Web App
Security Testing Web App
 
S Shah Web20
S Shah Web20S Shah Web20
S Shah Web20
 
Security Engineeringwith Patterns
Security Engineeringwith PatternsSecurity Engineeringwith Patterns
Security Engineeringwith Patterns
 

Similar a Security Web Servers

Nist Sp800 42
Nist Sp800 42Nist Sp800 42
Nist Sp800 42jnewlife
 
Guidelines on Securing Public Web Servers
Guidelines on Securing Public Web ServersGuidelines on Securing Public Web Servers
Guidelines on Securing Public Web Serverswebhostingguy
 
NIST Server Hardening Guide SP 800-123
NIST Server Hardening Guide  SP 800-123 NIST Server Hardening Guide  SP 800-123
NIST Server Hardening Guide SP 800-123 David Sweigert
 
4 - Keeping your website comfy and secure.pdf
4 - Keeping your website comfy and secure.pdf4 - Keeping your website comfy and secure.pdf
4 - Keeping your website comfy and secure.pdfAdmin621695
 
Special Publication 800-114 User’s Guide to Securing External De.docx
Special Publication 800-114 User’s Guide to Securing External De.docxSpecial Publication 800-114 User’s Guide to Securing External De.docx
Special Publication 800-114 User’s Guide to Securing External De.docxrafbolet0
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdfAdmin621695
 
Sp800 63 v1-0_2
Sp800 63 v1-0_2Sp800 63 v1-0_2
Sp800 63 v1-0_2Hai Nguyen
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...webhostingguy
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...webhostingguy
 
Guide to intrusion detection
Guide to intrusion detectionGuide to intrusion detection
Guide to intrusion detectionMarc Manthey
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityDeepakraj Sahu
 
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...Dr Dev Kambhampati
 
Draft NIST 7628 on CyberSecurity
Draft NIST 7628 on CyberSecurityDraft NIST 7628 on CyberSecurity
Draft NIST 7628 on CyberSecurityGovLoop
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184David Sweigert
 
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies HyTrust
 
NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97David Sweigert
 

Similar a Security Web Servers (20)

Nist Sp800 42
Nist Sp800 42Nist Sp800 42
Nist Sp800 42
 
Guidelines on Securing Public Web Servers
Guidelines on Securing Public Web ServersGuidelines on Securing Public Web Servers
Guidelines on Securing Public Web Servers
 
NIST Server Hardening Guide SP 800-123
NIST Server Hardening Guide  SP 800-123 NIST Server Hardening Guide  SP 800-123
NIST Server Hardening Guide SP 800-123
 
4 - Keeping your website comfy and secure.pdf
4 - Keeping your website comfy and secure.pdf4 - Keeping your website comfy and secure.pdf
4 - Keeping your website comfy and secure.pdf
 
Special Publication 800-114 User’s Guide to Securing External De.docx
Special Publication 800-114 User’s Guide to Securing External De.docxSpecial Publication 800-114 User’s Guide to Securing External De.docx
Special Publication 800-114 User’s Guide to Securing External De.docx
 
nist
nistnist
nist
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf
 
Sp800 63 v1-0_2
Sp800 63 v1-0_2Sp800 63 v1-0_2
Sp800 63 v1-0_2
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...
 
Guide to intrusion detection
Guide to intrusion detectionGuide to intrusion detection
Guide to intrusion detection
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
Guidelines for Smart Grid Cybersecurity Strategy, Architecture & High Level R...
 
Draft NIST 7628 on CyberSecurity
Draft NIST 7628 on CyberSecurityDraft NIST 7628 on CyberSecurity
Draft NIST 7628 on CyberSecurity
 
Sp800 92
Sp800 92Sp800 92
Sp800 92
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184
 
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
 
NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97NIST WiFi Security SP 800-97
NIST WiFi Security SP 800-97
 

Más de Aung Khant

Introducing Msd
Introducing MsdIntroducing Msd
Introducing MsdAung Khant
 
Securing Php App
Securing Php AppSecuring Php App
Securing Php AppAung Khant
 
Security Design Patterns
Security Design PatternsSecurity Design Patterns
Security Design PatternsAung Khant
 
Security Code Review
Security Code ReviewSecurity Code Review
Security Code ReviewAung Khant
 
Sql Injection Paper
Sql Injection PaperSql Injection Paper
Sql Injection PaperAung Khant
 
Sql Injection Adv Owasp
Sql Injection Adv OwaspSql Injection Adv Owasp
Sql Injection Adv OwaspAung Khant
 
Php Security Iissues
Php Security IissuesPhp Security Iissues
Php Security IissuesAung Khant
 
Sql Injection White Paper
Sql Injection White PaperSql Injection White Paper
Sql Injection White PaperAung Khant
 
S Vector4 Web App Sec Management
S Vector4 Web App Sec ManagementS Vector4 Web App Sec Management
S Vector4 Web App Sec ManagementAung Khant
 
Php Security Value1
Php Security Value1Php Security Value1
Php Security Value1Aung Khant
 
Privilege Escalation
Privilege EscalationPrivilege Escalation
Privilege EscalationAung Khant
 
Php Security Workshop
Php Security WorkshopPhp Security Workshop
Php Security WorkshopAung Khant
 
Preventing Xs Sin Perl Apache
Preventing Xs Sin Perl ApachePreventing Xs Sin Perl Apache
Preventing Xs Sin Perl ApacheAung Khant
 
Protecting Web App
Protecting Web AppProtecting Web App
Protecting Web AppAung Khant
 
Protecting Web Based Applications
Protecting Web Based ApplicationsProtecting Web Based Applications
Protecting Web Based ApplicationsAung Khant
 
Search Attacks
Search AttacksSearch Attacks
Search AttacksAung Khant
 
Secure Dev Practices
Secure Dev PracticesSecure Dev Practices
Secure Dev PracticesAung Khant
 
Secure Cross Domain Communication
Secure Cross Domain CommunicationSecure Cross Domain Communication
Secure Cross Domain CommunicationAung Khant
 
Secure Scripting
Secure ScriptingSecure Scripting
Secure ScriptingAung Khant
 

Más de Aung Khant (20)

Introducing Msd
Introducing MsdIntroducing Msd
Introducing Msd
 
Securing Php App
Securing Php AppSecuring Php App
Securing Php App
 
Security Design Patterns
Security Design PatternsSecurity Design Patterns
Security Design Patterns
 
Security Code Review
Security Code ReviewSecurity Code Review
Security Code Review
 
Sql Injection Paper
Sql Injection PaperSql Injection Paper
Sql Injection Paper
 
Sql Injection Adv Owasp
Sql Injection Adv OwaspSql Injection Adv Owasp
Sql Injection Adv Owasp
 
Php Security Iissues
Php Security IissuesPhp Security Iissues
Php Security Iissues
 
Sql Injection White Paper
Sql Injection White PaperSql Injection White Paper
Sql Injection White Paper
 
S Vector4 Web App Sec Management
S Vector4 Web App Sec ManagementS Vector4 Web App Sec Management
S Vector4 Web App Sec Management
 
Php Security Value1
Php Security Value1Php Security Value1
Php Security Value1
 
Privilege Escalation
Privilege EscalationPrivilege Escalation
Privilege Escalation
 
Php Security Workshop
Php Security WorkshopPhp Security Workshop
Php Security Workshop
 
Preventing Xs Sin Perl Apache
Preventing Xs Sin Perl ApachePreventing Xs Sin Perl Apache
Preventing Xs Sin Perl Apache
 
Protecting Web App
Protecting Web AppProtecting Web App
Protecting Web App
 
Protecting Web Based Applications
Protecting Web Based ApplicationsProtecting Web Based Applications
Protecting Web Based Applications
 
Ruby Security
Ruby SecurityRuby Security
Ruby Security
 
Search Attacks
Search AttacksSearch Attacks
Search Attacks
 
Secure Dev Practices
Secure Dev PracticesSecure Dev Practices
Secure Dev Practices
 
Secure Cross Domain Communication
Secure Cross Domain CommunicationSecure Cross Domain Communication
Secure Cross Domain Communication
 
Secure Scripting
Secure ScriptingSecure Scripting
Secure Scripting
 

Último

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Security Web Servers

  • 1. Special Publication 800-44 Version 2 Guidelines on Securing Public Web Servers Recommendations of the National Institute of Standards and Technology Miles Tracy Wayne Jansen Karen Scarfone Theodore Winograd