Question

In: Computer Science

what we should do to protect and secure Web Site and Web Application

what we should do to protect and secure Web Site and Web Application

Solutions

Expert Solution

The Best Practices to secure websites and Web applications are:

1. Having introduced Bounty Program:

  • Every Company have dedicated security professionals employed. then too they wont be able to identify all security risks.
  • Hence, to encourage the team to find security risks and report them, we can offer "Bounty Value".

2. Implementing the web security protocols:

  • using HTTPS protocol which is more enhanced with HTTP protocol.
  • using updated TLS certificates, which means Transport Layer Security provides encryption for transfering data.
  • use Strong passwords programs using keyGen protocols.

3. Installing firewalls:

  • Firewall is the software that protects web application from security threats which can compromise on security. We can create and maintain specific standard which must meet the security needs.
  • Website firewall prevents malicious software from accessing a server and hence security of website is not compromised. It also saves the traffic and bandwidth for website and web application accessed.

4. Scan for vulnerabilities in website:

  • scanning website and server vulnerabilities at regular intervals is much needed. It should be performed after changes made to web components.
  • we have number of free anti-virus softwares to measure how secured our website is. also hiring an secuity expert for an advice is appreciated.

5. Backup the website and WebApplication:

  • If an website is hacked, it is important for backups to recover our website from the security threat. Replacement of security protocols is not considered. backup can help us to recover damaged files.
  • Backup should be automatic. Generally we may forget to backup the website data, if in case backup is manual. So only automatic backup is scheduled at regular interval everyday.
  • For example, Few applications will automatic backup data everyday, which is the best way to avoid security threats.

Related Solutions

Define and discuss Web Site Security and also Define and discuss Web Application Security.
Define and discuss Web Site Security and also Define and discuss Web Application Security.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
From the security aspect of client/browser, connecting to a secure web site/server, Mention the importance of...
From the security aspect of client/browser, connecting to a secure web site/server, Mention the importance of web certificates. Mention 4 certificate issuing companies Mention a security incident (or case study) of exploiting web certificates. From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates?
Find student project for data mining application and describe what industry, where the web site )...
Find student project for data mining application and describe what industry, where the web site ) you locate the project then briefly describe the purpose of the project and how the problem was solved and major finding .
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security...
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates
When browsing a web site, we see the following message. What does it mean that the...
When browsing a web site, we see the following message. What does it mean that the certificate is not issued by a trusted CA? What is considered as a trusted CA? There is a problem with this website’s security certificate. The security certificate presented by this website was not issued by a trusted certificate authority.
Create an empty Web Site application named Bakery. Add a new Web page named Default.aspx to the application. Change the DOCUMENT object's Title property to Meyer's.
In Visual BasicCreate an empty Web Site application named Bakery. Add a new Web page named Default.aspx to the application. Change the DOCUMENT object's Title property to Meyer's. The application should allow the user to enter two items: the number of doughnuts ordered and the number of muffins ordered. The application should should display the total number of items ordered and the total sales amount, inlcuding a 5% sales tax. A doughnut costs .50; a muffin costs .75. Save the...
How should we decide what industries to protect? In the 1970s, we protected the car industry...
How should we decide what industries to protect? In the 1970s, we protected the car industry from foreign competition. We also heavily protect our farm industry. However, we did NOT protect steel or microchips, and many other industries that must compete globally. Please answer the following questions. When the first Japanese cars arrived on the West Coast in the 1970s, no one saw them as a threat to U.S. jobs. Although they were cheaper and more fuel-efficient than U.S.-made cars,...
Create a web site to share your travel blog stories from multiple trips. Desktop site should...
Create a web site to share your travel blog stories from multiple trips. Desktop site should have three columns, the left being navigation, middle is your text, the right is some basic facts about the location that you visited. Tablet site should have two columns, dropping the right column. Mobile phone site should have one column, with the navigation becoming the drop-down list. Create a form and use JavaScript to validate the user data. Submitting valid data should result in...
Create a web site to share your travel blog stories from multiple trips. Desktop site should...
Create a web site to share your travel blog stories from multiple trips. Desktop site should have three columns, the left being navigation, middle is your text, the right is some basic facts about the location that you visited. Tablet site should have two columns, dropping the right column. Mobile phone site should have one column, with the navigation becoming the drop-down list. In HTML, also don't worry about putting information on the columns you can just put some kind...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT