Website Security
Website Security
Name
Professor
Course
Date
WEB BASED INFRASTRUCTURE.
A secure website is one that strife to maintain Confidentiality, integrity and availability.
protected from unauthorized users. Website should bear some integrity rules that it should focus
so as to work on a given task without it being tampered with. Since most websites are build
based on the motive of service delivery, then those services should be available and nothing
Since a website is founded on three main infrastructures i.e.; the application software, connected
to a network and residing in a given physical environment, therefore also security measures
made right from the time of development. Coding should generate codes that are free from
errors. Other forms of software security include use of antivirus software, and use of user
Another means of securing a website is achieved through network security. Network security can
be realized through the use of such measures as firewalls, encryptions, and digital signatures
amongst others. Computer servers hosting websites needs to be fully equipped with firewalls to
prevent computer systems that are in the network from opening links to unauthorized sites.
Data transmitted over the network can also be secured through the use of such means as digital
Physical security is another form of securing a website. It relates to environmental factors that
surround the structure under which the website resides in. Threats that can be exhibited in such
environment include: theft, fire breakouts, power loss and extreme temperatures. These
WEB BASED INFRASTRUCTURE.
environmental threats can be handled by use of such measures as door locking, employing
security personnel, installing fire fighters in place, installing uninterrupted power supplies, and
In as much as the website is maintained to be secure, plans need to be put in place that will
ensure normal delivery of services by the website even in times of crisis. This kind of
preparedness for the handle disasters and continue with normal operations is achieved through
Business continuity planning is a process that is followed from one step to another. To start with
the critical factors that might bring down the website are identified and every operation being
After the critical factors have been identified, impact analysis is carried out to determine
possible impact that might arise and the risk that it might cause. Decision needs to be reached in
consideration whether the risk is so critical that it can paralyze all operations or the services will
still run.
Following the impact analysis is the development of resumption strategies, here a plan is carried
out on how the business will be resumed back after the critical factor has occurred. The business
The last thing is testing of the business continuity planning itself where the developed business
continuity plan is put on operation to ascertain if it is effective. This will determine if the
business continuity planning is ready for implementation or if it still needs more improvements.
WEB BASED INFRASTRUCTURE.
References
Dougherty, M., MA, RHIA, & CHP. (2009 - 2011). 10 Security Domains (Updated). Tom Walsh, CISSP
(2009, 2011).
Meier, J., Mackman, A., Dunner, M., Vasireddy, S., & Murukan, R. E. (2003). Improving Web Application
Security. Microsoft Corporation.
Pearson Education; . (2015). Network Security Concepts and Policies. Indianapolis: Cisco Press.