Web Applications Security

Securing Computers and Web applications
Securing Computers and Web applications

The Internet is filled with people trying to make a name for themselves by breaking your code, crashing your site, posting inappropriate content, and otherwise making your day interesting. It doesn’t matter if you have a small or large site; you are a target by simply being online, by having a server that can be connected to. Many cracking programs do not discern by size, they simply trawl massive IP blocks looking for victims. Try not to become one.
When on a shared host, security simply isn’t going to be as strong as when on a dedicated host. This is one of the tradeoffs for the inexpensive fee. Shared hosting environments perhaps ought to be considered from the security mindset in the same fashion as a compromised system (that which has or may have been already cracked into).
In order to secure our web applications I read some resources in order to identify different types of vulnerabilities and what are the measures that should be taken to protect our applications. In the first part I will talk about vulnerabilities and measures that should be taken for protection. In the second part you will find a checklist to be used when developing any application. In the appendixes you will find examples about filtering, validations and other security related issues.

Download Web Applications Security Full Report

Published by

Youssef Kassab

Youssef is a Computer and Communications Engineer with 10 years of experience in the digital field.

Leave a Reply