Information Security Administration
Host a
Website
Setup,
Introduction
Manage and
to Website
Secure a Web
hosting
Server
Host a Website:6
Information Security Administration
Introduction to Website hosting
• Web hosting is a service in which storage space is provided to websites of
individuals or organizations on web server, so that the websites are accessible via
World Wide Web.
• Today billions websites currently online and millions of people all over the world
access those websites.
• Web hosting means, you have some server space where you store your website’s
files and you have a complete control over it.
Information Security Administration
Introduction to Website hosting
• Fig : Web server storage space
Host a Website:6
Information Security Administration
Introduction to Website hosting
• Website hosting provider The web hosting provider is the third party between
client and server.
• They provide space on the web server where your website is stored, so that user
can view on the Internet.
• Web hosting providers also provide add-on services like: data backup, firewall
protection, technical support, email services, domain name registration, website
building tools, and applications.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Let us see one by one.
• Specification: Windows 7 OS, internet
connection, your own web page (website).
1. Purchase Domain Name: Purchase
Domain Name from any domain name
provider (I purchase Domain from
bigrock.in)
• Step 1: Select Domain and Domain
Name Registration
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 2: Type your expected domain name and search
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 3: After searching, it will display all available domain name. You can buy any
one from list and click on CHECKOUT
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 4: After on CHECKOUT, it will display you bill amount. Click on NEXT to
proceed.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 5: Click on CONTINUE to create a new account.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 6: Fill information and create account.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 7: Select payment option and complete the transaction to buy your domain
name.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 2. Web Hosting: Host your website (For demo purpose, I host my website through
freehosting.com)
Step 1: Open freehosting.com, select free hosting option of WEB HOSTING
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 2: Click on SIGN UP FOR FREE.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 3: We already purchase domain name from bigrock.in, so select I will use my
existing domain and update my nameserver , type your purchased domain name
(bvussm.online) in text box and click on Use button
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 4: This page will show configuration setting, just click on Continue button
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 5: This page will show order summary (our web hosting is free), just click on
Checkout button
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 6: Fill personal
information, as we know
our web hosting is free so
just select pay later
option of payment and
Complete Order.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 7: After order competition process, Order confirmation page will show Your
Order Number
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 8: Now check your registered email account and open mail received from
FREEHOSTING. Click on provided link to verify your email address and complete
your free web hosting registration process.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 9: After click on provided link, you will redirect on Login page. Fill login details
and Login into your freehosting account.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 10: After Login, welcome page will shows your Services. Click on Services to
view your web hosting service status. Still status is pending because it will take time
few minutes to activate your service.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• After few minutes your service will activated as shown below.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 11: After you have purchased your web hosting, you will get Name Servers.
Check your email account and open mail received from freehosting. This mail
contains your account information (Username and password) and nameserver
details.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 3. Change Your DNS Address: To get
your website up and working, you will
need to change the Name Servers of
your domain. It’s a simple but
mandatory step for you to get started.
Step 1: Go to your Domain Registration
site via http://bigrock.in/login. Enter your
registered email address and password.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 2: Click on your domain name (bvussm.online) for which you need to change
the Name Servers. In the Domain Registration section, click on the Name Servers
option.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 3: Replace the existing Name Servers with the ones provided by your current
web host, and click on the Update Name Servers button. After you have changed
your DNS, it will take about 24- 48 hours for your website to start.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 4. Upload Your Website: You can now upload your website to
your account by connecting to the server using cPanel’s File
Manager after which your website will go live.
• A control panel, in web hosting, is a web-based interface
provided by the hosting company that allows customers to
manage their various hosted services in a single place. One of
the widely used and well known control panel is cPanel.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 1: Log in to your cPanel using your hosting URL e.g
(www.buvssm.online/cpanel). It will open your cpanel, Click on the icon titled File
Manager
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 2: Select Web Root and click on Go. Add all the files and folders under
public_html and their respective domain folder.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• Step 3: When you click on upload a new window will be open with upload option.
Select the file that you want to upload and hit the submit button.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 5. View your website: Open web browser and type your domain e.g
(www.bvussm.online)
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• When it comes to taking care of web server, a few rules should be applied. Set up
backup server to protect your server in case things go wrong. Keep root users
account information in safe place and not easy to guess, so hackers can’t get in.
Keep the software up to date. In this part, I am going to explain more security
measures to protect our web server from cyber attack.
• 1. Use a Secure Connection: Establish a secure channel for communication while
connecting to a remote server, it is essential to use SSH(Secure Shell) Protocol to
establish a protected connection because SSH encrypts all data transmitted in the
exchange.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 2. Use SSH Keys Authentication: Use SSH key authentication Instead of a traditional
password. SSH server using a pair of SSH keys which is better than traditional logins.
SSH keys carry many more bits than a password and are not easily cracked by most
modern computers.
• 3. Secure File Transfer Protocol: To transfer files to and from a server without
danger of hackers compromising or stealing data, use File Transfer Protocol. FTP
encrypts data files and your authentication information during transfer. As soon as
they reach the server, the data is no longer encrypted. For this reason, encrypting
the files before sending them adds another layer of security.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 4. Secure Sockets Layer Certificates: Websites that have the SSL certificate have HTTPS in
the URL, indicating they are secure. Secure Socket Layer (SSL) guard your sensitive
information (like: IDs, credit card numbers, password, and other personal information)
passed between client and server. Not only does the certificate encrypt data, but it is also
used for user
• 5. Use Virtual Private Networks: A Virtual private network is one another way to ensure
secure communications. Private networks use a private IP to establish lonely
communication channels between servers within the same range.
• 6. Monitor Login Attempts: Use intrusion prevention software to monitor login attempts
to protect your server against brute force attacks. Intrusion prevention software oversees
all log files and detects if there are suspicious login attempts. If the number of attempts
exceeds, intrusion prevention software blocks the IP address for a certain period of time.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 7. Manage Users: Every server has a root user who can execute any command he has the most
power, hence hackers focus to try cracking password of that root user to gaining access on
server. To protect server from outsiders so that they do not misuse root privileges, you can
create a limited user account having ability to perform administrative tasks but this account
does not have the same authority as the root. For security reason, you can use limited user
account to manage and control most of the tasks and use the root account only when
necessary.
• 8. Use Passphrases for Server Passwords: passphrase is longer than password and contains
spaces between the words. It can be a sentence containing upper and lower case letters,
numbers, and unique characters. It contains 49 characters, hence more difficult to crack. For
example, a passphrase will be: Mylove@ToEatPizza786SFCmall. The given example is longer
than a usual password; besides, it is much easier to remember a passphrase than a string of
random letters.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 12. File Auditing: File auditing is one of the good ways to discover unwanted
changes on your system. It is keeping a record of all the characteristics of your
system when it is in a good, “healthy,” state and comparing it to the current state.
By comparing the previous versions and current version of the same system, you
can detect all the changeability and track their origin.
• 13. Set Up and Maintain a Firewall: Set up a firewall during the initial server setup
or when you make changes to the services the server offers. Secure your server by
controlling and restricting access to your system. Using CSF (ConfigServer and
Firewall) is essential in tightening up security on your server.
Host a Website:6
Information Security Administration
Setup, Manage and Secure a Web Server
• 14. Back up Server: To secure data of your server, it is crucial to have a backup of
the system in case something goes wrong.
• 15. Create Multi-Server Environments: Database servers and web application
servers should be separate, because separate execution environments are
beneficial to larger scale businesses that cannot afford any security breaches.
Independent database servers secure sensitive information and system files from
hackers that manage to gain access to administrative accounts. Isolation is one of
the best types of server protection.
Host a Website:6
Information Security Administration
Thank You
Host a Website:6