SlideShare a Scribd company logo
1 of 14
Web
Security
Instructor: Miss Faiqa Maqsood
Presented by: Khubaib Ahmad
Fact
O I’m not saying this to try and scare you, but
that’s the reality of the world we live in. More
than 50,000 websites get hacked each day. In
fact, 43% of cyber crimes are against small
businesses.
(LARAS LOFGREN)
Web Security
Any idea?
Web Security
O Web security also known as “Cyber security”
involves protecting website or web application by
detecting, preventing and responding to attacks.
O This software can scan for backdoor hacks,
redirect hacks, Trojans, and many other threats.
O Website security software notifies the user if the
website has any issue and provides solutions to
address them.
Common Threats List
O There are a few major threats to security
which are the most common ways in which a
website becomes hacked.
O There isn’t just one way that websites get
attacked. So before we proceed, I want to give
you a brief overview of some of the most
common threats to your website security.
Common Threats List
O Spam
O Viruses and malware
O WHOIS domain registration
O SQL injection
O DDoS attacks
O Search engine blacklists
Technically, this isn’t a security threat. However, if your
website isn’t properly secured, it can impact your SEO
rankings.
According to a recent study, 74% of hacked websites were
attacked for SEO reasons.
If lots of users are reporting your site as spam or unsafe, you
could be added to a search engine blacklist. Once you’re on
that list, it’s extremely difficult to get off.
Available Technology
Any website or application that is secure is surely backed
by different types of checkpoints and techniques for
keeping it safe.
There are different types of technologies available for
maintaining the best security standards. Some popular
technical solutions for testing, building, and preventing
threats include:
O Black box testing tools
O White box testing tools
O Web application firewalls (WAF)
O Security scanners
O Password cracking tools
O Content Delivery Network (CDN)
How to keep your website safe
These are the steps you need to take to improve
your website security in 2019.
O Update your software
O Choose a safe web hosting plan
O Change your password
O Use tools to monitor your security
O Limit user access
O Backup your website
i.e. backup plug-in like BackupBuddy.
Continue….
Use HTTPS protocol
O Without HTTPS a hacker can change information on the page
to gather personal information from your site visitors. For
example, they could steal login information and passwords
from users.
O HTTPS protocol will also improve your search ranking. Google
is rewarding websites that use this security measure.
Continue….
O SSL (Secure Socket Layer) Certificates
Not-secure websites send and receive unencrypted
data which can be watched, altered or stolen.
Questions
References
O https://www.g2.com/categories/website-security
O https://www.beyondsecurity.com/blog/web-security-basics
O https://blog.comodo.com/what-is-website-security/
O https://www.sitelock.com/blog/what-is-website-security/
O https://www.quicksprout.com/website-security/
O https://www.cloudflare.com/learning/security/what-is-web-
application-security/
O https://pk.godaddy.com/web-security
O https://www.owasp.org/index.php/Main_Page
O https://developer.mozilla.org/en-US/docs/Learn/Server-
side/First_steps/Website_security
O https://slideplayer.com/slide/8086217/
O https://www.slideshare.net/rahmatmukodas/websecurity-
46906149
Web security by khubaib

More Related Content

What's hot

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]MeeraNairJ
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 

What's hot (19)

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 

Similar to Web security by khubaib

How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfNeilStark1
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityHTS Hosting
 
Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...Osama Salah
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
What is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdfWhat is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdfHost It Smart
 
According to owasp, there are eight reasons why odoo is the most secure platform
According to owasp, there are eight reasons why odoo is the most secure platformAccording to owasp, there are eight reasons why odoo is the most secure platform
According to owasp, there are eight reasons why odoo is the most secure platformGeminate Consultancy Services
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxdhananjay80
 

Similar to Web security by khubaib (20)

How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Site guard
Site guardSite guard
Site guard
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
What is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdfWhat is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdf
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
According to owasp, there are eight reasons why odoo is the most secure platform
According to owasp, there are eight reasons why odoo is the most secure platformAccording to owasp, there are eight reasons why odoo is the most secure platform
According to owasp, there are eight reasons why odoo is the most secure platform
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Web security by khubaib

  • 2. Instructor: Miss Faiqa Maqsood Presented by: Khubaib Ahmad
  • 3. Fact O I’m not saying this to try and scare you, but that’s the reality of the world we live in. More than 50,000 websites get hacked each day. In fact, 43% of cyber crimes are against small businesses. (LARAS LOFGREN)
  • 5. Web Security O Web security also known as “Cyber security” involves protecting website or web application by detecting, preventing and responding to attacks. O This software can scan for backdoor hacks, redirect hacks, Trojans, and many other threats. O Website security software notifies the user if the website has any issue and provides solutions to address them.
  • 6. Common Threats List O There are a few major threats to security which are the most common ways in which a website becomes hacked. O There isn’t just one way that websites get attacked. So before we proceed, I want to give you a brief overview of some of the most common threats to your website security.
  • 7. Common Threats List O Spam O Viruses and malware O WHOIS domain registration O SQL injection O DDoS attacks O Search engine blacklists Technically, this isn’t a security threat. However, if your website isn’t properly secured, it can impact your SEO rankings. According to a recent study, 74% of hacked websites were attacked for SEO reasons. If lots of users are reporting your site as spam or unsafe, you could be added to a search engine blacklist. Once you’re on that list, it’s extremely difficult to get off.
  • 8. Available Technology Any website or application that is secure is surely backed by different types of checkpoints and techniques for keeping it safe. There are different types of technologies available for maintaining the best security standards. Some popular technical solutions for testing, building, and preventing threats include: O Black box testing tools O White box testing tools O Web application firewalls (WAF) O Security scanners O Password cracking tools O Content Delivery Network (CDN)
  • 9. How to keep your website safe These are the steps you need to take to improve your website security in 2019. O Update your software O Choose a safe web hosting plan O Change your password O Use tools to monitor your security O Limit user access O Backup your website i.e. backup plug-in like BackupBuddy.
  • 10. Continue…. Use HTTPS protocol O Without HTTPS a hacker can change information on the page to gather personal information from your site visitors. For example, they could steal login information and passwords from users. O HTTPS protocol will also improve your search ranking. Google is rewarding websites that use this security measure.
  • 11. Continue…. O SSL (Secure Socket Layer) Certificates Not-secure websites send and receive unencrypted data which can be watched, altered or stolen.
  • 13. References O https://www.g2.com/categories/website-security O https://www.beyondsecurity.com/blog/web-security-basics O https://blog.comodo.com/what-is-website-security/ O https://www.sitelock.com/blog/what-is-website-security/ O https://www.quicksprout.com/website-security/ O https://www.cloudflare.com/learning/security/what-is-web- application-security/ O https://pk.godaddy.com/web-security O https://www.owasp.org/index.php/Main_Page O https://developer.mozilla.org/en-US/docs/Learn/Server- side/First_steps/Website_security O https://slideplayer.com/slide/8086217/ O https://www.slideshare.net/rahmatmukodas/websecurity- 46906149