Course: MIS (Management Information System) Title: Security Risks On The Web Assignment
Course: MIS (Management Information System) Title: Security Risks On The Web Assignment
.Assignment
1
Contents
Introduction:...............................................................................................3
Risks that threaten the security of browsers and how to protect them:......6
Firewalls.....................................................................................................7
Proxy Service:............................................................................................7
Stateful Inspection:.....................................................................................7
References:.................................................................................................9
2
Introduction:
The Internet is a giant network of millions of Internet sites in the world All these sites
use technologies and languages in the programming and design of their own sites.
Web attacks are attacks and security risks designed to exploit the weakness of this
software system (site) either to sabotage it or to steal information or even stop the site.
Internet surfers around the world practice their online activities in the open space of
the Internet and without security restrictions. On the private sector, companies and
institutions that have websites to expose their information on this network are exposed
to Internet and extranets, which expose them to multiple types of risks Commensurate
with the size of the information, the method of its construction, the location of the
broadcast of the headquarters information, and the linkage of the information base to
the internal systems of the establishment and the external systems with the business
partners. And this makes them vulnerable to breakthroughs, damage to the
establishment1.
The reliance on the Internet has become a major communication medium in various
fields of employment, highlighting the importance of focusing on the risks that may
result from that use. There are many risks, some serious and some less serious. These
risks range from virus infections to data and information stored on a computer.
Penetration of websites and tampering with user files.
1
http://www.aleqt.com/2013/02/18/article_732473.html
3
Types of security risks on the web:
4
which is like opening the door wide to any entry into internal systems . Access to
internal systems is a real threat to the organization. Those who have access can obtain
internal information about the organization, which may lead to negative results in the
company's business or may sometimes result in the company completely shutting
down. All internal information of the institution. Although there are data reserves,
erasing some data may result in the loss of some important information, which enters
operations without appearing in results, which may not be recoverable.
5
Why web browsers security?
It is difficult to ensure the security of browsers because of the evolution of
technologies used to penetrate the security of browsers at a high speed, making it
difficult to develop browsers in accordance with the risks, and in addition to ensure
the safety of sites visited by users; therefore, the security of browsers is common
between the designers of browsers and users.
The security of browsers is important for many reasons, the most important of which are:
1) Many users are unaware of the threats they face while using a web browser.
2) Many users ignore updates.
3) Use of browsers in many private and confidential transactions.
4) Different locations visited by users, from sites with high confidentiality and
confidentiality.
5) Many users are unaware of the features and functionality of web browsers and how
they are used.
6) Web browser developers give up confidentiality for more browser functionality.
7) Interfacing web browsers with operating systems, increasing the risk to users.
8) Many websites require users to activate certain features that compromise their
devices.
6
Tools for checking site security
1 - Google scan tool: a tool provided by Google to examine the website and ensure the
existence of any content is not safe.
2- Scan My Server: An excellent site that scans your site for all vulnerabilities and
sends you a security report on all the gaps.
3-SUCURI: A free and easy to use tool that checks for any malicious code on the
website.
4. SSL Labs: An excellent site that scans HTTPS sites and gives you information
about the SSL certificate and the SSL protocol. It is very important that you check
your site using this tool.
5- Quttera : a good tool to check the website and scan it for any harmful code
available in it.
6. Detectify : This tool performs more than 100 security checks on your site for gaps.
8. Web Inspector: Another tool that scans for harmful code and malware.
Firewalls
Firewalls are a software program or hardware that filters information coming through
the Web to a private site, and the installations are designed to isolate their own
internal network from the Web to prevent intrusions and intrusion.
Proxy Service:
The firewall itself appoints an agent for the intranet, thus blocking the intranet
addresses and thus sending the data to the firewall address that in turn directs it to its
original destination.
7
Stateful Inspection:
The firewall here checks certain fields of packets, not checking all packet
components, but comparing them to the corresponding fields in the same context.
When it detects that certain packages have not adhered to the context rules, Threatens
the security of the site.
8
Conclusion and recommendations:
There are many preventive measures and steps that protect against the dangers of
hacking the website and breaking the confidentiality and privacy of these websites:
It is a good idea to make a very strong password for hosting data and the control panel
of the website to prevent penetration, because those who try to penetrate are working
on the exploitation of sites with weak words and the password must be surrounded by
the secret of large and not accessible to everyone and difficult to guess also not Be
vulnerable to theft or leakage to other hackers.
2
https://basicinternetsecurity.org/book/basic-internet-security.pdf
3
http://www.metjar.com/ecommerce/internet_safety_and_security.html
9
References:
1) https://basicinternetsecurity.org/book/basic-internet-security.pdf
2) http://www.aleqt.com/2013/02/18/article_732473.html
3) http://www.metjar.com/ecommerce/internet_safety_and_security.html
4) https://www.tutorialspoint.com/internet_security/internet_security_tutorial.pdf
5) http://www.websiteinsurance.co.uk/what-are-my-website-risks/
10