SlideShare une entreprise Scribd logo
1  sur  10
 Ensuring your software up to date is vital in keeping your site secure. This
applies to both the server operating system and any software you may be
running on your website such as a CMS or forum. When website security
holes are found in software, hackers are quick to attempt to abuse them.
 SQL injection attacks are when an attacker uses a web form field or URL
parameter to gain access to or manipulate your database. When you use
standard Transact SQL it is easy to unknowingly insert rogue code into your
query that could be used to change tables, get information and delete
data.
 Be careful with how much information you give away in your error
messages. For example if you have a login form on your website you should
think about the language you use to communicate failure when attempting
logins. You should use generic messages like “Incorrect username or
password” as not to specify when a user got half of the query right.
 Validation should always be done both on the browser and server side. The
browser can catch simple failures like mandatory fields that are empty
and when you enter text into a numbers only field. You should make sure
you check for these validation and deeper validation server side as failing
to do so could lead to malicious code or scripting code being inserted into
the database or could cause undesirable results in your website.
 Everyone knows they should use complex passwords, but that doesn’t mean
they always do. It is crucial to use strong passwords to your server and
website admin area, but equally also important to insist on good password
practices for your users to protect the security of their accounts.
 Allowing users to upload files to your website can be a big website
security risk. The risk is that any file uploaded however innocent it
may look, could contain a script that when executed on your server
completely opens up your website. If you have a file upload form then
you need to treat all files with great suspicion.
 SSL is a protocol used to provide security over the Internet. It is a good
idea to use a security certificate whenever you are passing personal
information between the website and web server or database.
 Once you think you have done all, then it's time to test your website
security. The most effective way of doing this is via the use of some
website security tools, often referred to as penetration testing or pen
testing for short.
ATEES EUROPE

Contenu connexe

En vedette

En vedette (9)

Prezentace, která se měla promítat na stužkováku (14.11.2013)
Prezentace, která se měla promítat na stužkováku (14.11.2013)Prezentace, která se měla promítat na stužkováku (14.11.2013)
Prezentace, která se měla promítat na stužkováku (14.11.2013)
 
Rich poor
Rich poorRich poor
Rich poor
 
Happy life 8
Happy life 8Happy life 8
Happy life 8
 
OpenConext: Authentication & Authorization Infrastructure for Virtual Researc...
OpenConext: Authentication & Authorization Infrastructure for Virtual Researc...OpenConext: Authentication & Authorization Infrastructure for Virtual Researc...
OpenConext: Authentication & Authorization Infrastructure for Virtual Researc...
 
MPLS -Novel approach of multi protocol label switching for Asynchronous Trans...
MPLS -Novel approach of multi protocol label switching for Asynchronous Trans...MPLS -Novel approach of multi protocol label switching for Asynchronous Trans...
MPLS -Novel approach of multi protocol label switching for Asynchronous Trans...
 
Hitch hiking journalclub
Hitch hiking journalclubHitch hiking journalclub
Hitch hiking journalclub
 
Halloween powerpoint
Halloween powerpointHalloween powerpoint
Halloween powerpoint
 
Strategy english
Strategy englishStrategy english
Strategy english
 
CURSO DE SUPERACIÓN LENGUA CASTELLANA Y CIENCIAS NATURALES
CURSO DE SUPERACIÓN LENGUA CASTELLANA Y CIENCIAS NATURALES CURSO DE SUPERACIÓN LENGUA CASTELLANA Y CIENCIAS NATURALES
CURSO DE SUPERACIÓN LENGUA CASTELLANA Y CIENCIAS NATURALES
 

Plus de Emillykelly

Popular social media that people use
Popular social media that people usePopular social media that people use
Popular social media that people use
Emillykelly
 
Easy photography tips
Easy photography tipsEasy photography tips
Easy photography tips
Emillykelly
 
How to Reduce stress
How to Reduce stressHow to Reduce stress
How to Reduce stress
Emillykelly
 

Plus de Emillykelly (7)

Tips for choosing the right domain name
Tips for choosing the right domain nameTips for choosing the right domain name
Tips for choosing the right domain name
 
Tips for real estate investors
Tips for real estate investorsTips for real estate investors
Tips for real estate investors
 
10 things to check before buying a home or property in india
10 things to check before buying a home or property in india10 things to check before buying a home or property in india
10 things to check before buying a home or property in india
 
Breeds of dogs
Breeds of dogsBreeds of dogs
Breeds of dogs
 
Popular social media that people use
Popular social media that people usePopular social media that people use
Popular social media that people use
 
Easy photography tips
Easy photography tipsEasy photography tips
Easy photography tips
 
How to Reduce stress
How to Reduce stressHow to Reduce stress
How to Reduce stress
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Security tips to protect your website from hackers

  • 1.
  • 2.  Ensuring your software up to date is vital in keeping your site secure. This applies to both the server operating system and any software you may be running on your website such as a CMS or forum. When website security holes are found in software, hackers are quick to attempt to abuse them.
  • 3.  SQL injection attacks are when an attacker uses a web form field or URL parameter to gain access to or manipulate your database. When you use standard Transact SQL it is easy to unknowingly insert rogue code into your query that could be used to change tables, get information and delete data.
  • 4.  Be careful with how much information you give away in your error messages. For example if you have a login form on your website you should think about the language you use to communicate failure when attempting logins. You should use generic messages like “Incorrect username or password” as not to specify when a user got half of the query right.
  • 5.  Validation should always be done both on the browser and server side. The browser can catch simple failures like mandatory fields that are empty and when you enter text into a numbers only field. You should make sure you check for these validation and deeper validation server side as failing to do so could lead to malicious code or scripting code being inserted into the database or could cause undesirable results in your website.
  • 6.  Everyone knows they should use complex passwords, but that doesn’t mean they always do. It is crucial to use strong passwords to your server and website admin area, but equally also important to insist on good password practices for your users to protect the security of their accounts.
  • 7.  Allowing users to upload files to your website can be a big website security risk. The risk is that any file uploaded however innocent it may look, could contain a script that when executed on your server completely opens up your website. If you have a file upload form then you need to treat all files with great suspicion.
  • 8.  SSL is a protocol used to provide security over the Internet. It is a good idea to use a security certificate whenever you are passing personal information between the website and web server or database.
  • 9.  Once you think you have done all, then it's time to test your website security. The most effective way of doing this is via the use of some website security tools, often referred to as penetration testing or pen testing for short.