Wednesday, July 17, 2019

Internet Security Essay

The key techniques to the near afford equal to(p) web post auspices would be the episodic features of the website for the purpose of safeguarding the website content and the transactions that argon to be made for fulfilling the ecommerce objectives of the website. The following place be credited to the diverse ship canal to secure the website and guest info for the Grandmas Treats website vane content security It forms the greater disassociate of the security as they ar aimed at non-representation or illegal presentation of phony content that a user is non expected to see.The term cross site scripting (or XSS) is often used in juncture with the web content and links that argon to be secured for a website. Acunetix (2007) own w atomic number 18 Acunetix weave Vulnerability Scanner is soft downloadable and comes free. Using that virtuoso could scan their website for each such flaws. Directory traversal attacks The directory traversal attacks ar quite common where the li nks be traversed to a very different form where the development flows to the hackers. It is due to the malfunction of the codes at the leaf node and server sides.The code efficacy and link path requires to be canvass sporadic every last(predicate)y so that one is able to redesign and test the system for every malfunction. SQL injection It is another method where intruders are capable to draw information from one website apply SQL languages to illegally fetch customers data for obtaining their financial information or to manipulate information for do by use. The website must be term of enlistmented periodically for such incidents and must also elucidate sure that customer records are encrypted using 128 bit security layers at the database side.The database security must be checked for acquire sure that no such legal action is evident. The customers financial information would be encrypted to hide it from easy addition from hackers. E-commerce transactions security The u se of SSL 3. 0 makes sure that all vulnerabilities regarding the tapping of information so that ones purchases are safe in all respects. The use of this protocol makes sure that a secured channel is followed for communication between the client communicating clients.The use of Transport mould Security (TLS) is important and can be enabled for any website for securing the communication to the communicating clients. IETF (2007) explains that TLS composes of particular to point authentication techniques and communications hiding everyplace the internet strengthening the encryption. 1. Web server checks and database security checks The periodic checks are done to put a check on performance of the website and database usage. All the applicable links and database security is checked for overall assurance.2. Database backup The database backup plans must be devised accordingly for keeping the records safe to nurture against unforeseen disasters (Navathe, 2002). These simple tips wou ld be assistive for the website to take care of the affordable unavoidably for security and customer data testimonial so that one is able to safely carry out transactions over the internet.ReferencesAcunetix (2007). Web rank Security stub Check & Implement Web Site Security. Retrieved 16, December 2007 from http//www.acunetix.com/websitesecurity/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.