SlideShare a Scribd company logo
Keys To Create A SecureKeys To Create A Secure
WebsiteWebsite
The NeedThe Need
You may think your website haven't anything that
is worth for anyone to be hacked but it is found
that majority of security breaches are used to use
your server to setup temporary server and use it
as an email relay for Spam instead of stealing your
data.
Key 1 :Key 1 : Upto Date SoftwareUpto Date Software
It is obvious that one should have updated
systems all the time but ensuring updates software
up to date is somehow vital. This key applies for
both servers, the operating system and the
software you may running on web.
Key 2 :Key 2 : SQL injectionSQL injection
Attacker often use SQL injection i.e. a URL
parameter to manipulate database. When a
standard SQL query is used, it is easy to amend
accordingly and insert rogue code to change
tables and get information. The key purpose is to
use parameterized queries and it easy to
implement for majority of web languages which is
in use by most of the website design companies.
Key 3 :Key 3 : PasswordsPasswords
Using a complex password is not always sufficient
as much users not like to enforce them for
requirement like length, use of special symbols
and uppercase letters etc. Instead it should be
save with encrypted values and salt the passwords
for extra security.
Key 4 :Key 4 : SSLSSL
SSL protocol is widely used to provide secure
connections for communication over the Internet.
Your personal information got hacked if medium of
communication is not secure.
Key 5 :Key 5 : Web Security ToolsWeb Security Tools
Once you have done with all your web
development tasks, then it comes to check for your
website security check. There are many on line
free and paid tools available for this check which
do provide you details result with low medium and
high security alerts. Majority of CMSes has inbuilt
security features.
Key 6 :Key 6 : Server Side/Form ValidationServer Side/Form Validation
It is necessary to implement validation on browser
side as well as server side. Malicious code or
script can be inserted if failed to do so.
Key 7 :Key 7 : File UploadsFile Uploads
It can be a big security risk if you allow users to
upload files on your website. You can achieve
secure file uploading by variety of methods but its
more likely suggested that prevent direct access to
those uploaded files together. In this way, the files
are stored in a separate folder which is outside of
the root folder.
Key 8 :Key 8 : Displaying Error MessagesDisplaying Error Messages
You must be careful regarding the error messages
you are displaying while any attempt on your
website. Attacker can get user-name and
password with an attack that when one of the
fields get corrected. You should use general
messages like "Incorrect User-name or Password"
rather than to mention when a user got query
corrected to some extent.
Get More Solutions
The web application development
company that offers endless
oppurtunities for its clients.
http://clickripplesolutions.com

More Related Content

What's hot (20)

PPTX
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
OWASP Kyiv
 
PPTX
So Your Company Hired A Pentester
NorthBayWeb
 
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
AgileNetwork
 
PPTX
OWASP -Top 5 Jagjit
Jagjit Singh Brar
 
PDF
Web Application Firewall - Web Application & Web Services Security integrated...
Thomas Malmberg
 
PPTX
What the fuzz
Christopher Frenz
 
PPTX
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
PDF
API Security with Postman and Qualys
Postman
 
PPTX
Secure Code Warrior - Robust error checking
Secure Code Warrior
 
PPTX
Windows 10 and the cloud: Why the future needs hybrid solutions
Alexander Benoit
 
PPTX
Secure Code Warrior - Authentication
Secure Code Warrior
 
PPTX
Fortify dev ops (002)
Madhavan Marimuthu
 
PPTX
Denali Sql Server Security
Gabriel Villa
 
PPTX
Security Testing - A complete Guide
BugRaptors
 
PPTX
Web server scripting - Security Issues
John Robinson
 
PPTX
Owasp top 10 Vulnerabilities by cyberops infosec
Cyberops Infosec LLP
 
PPTX
Overview of RateSetter web security
RateSetter
 
PDF
CSS17: Houston - Stories from the Security Operations Center
Alert Logic
 
PPTX
IT security : Keep calm and monitor PowerShell
ManageEngine
 
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
OWASP Kyiv
 
So Your Company Hired A Pentester
NorthBayWeb
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
AgileNetwork
 
OWASP -Top 5 Jagjit
Jagjit Singh Brar
 
Web Application Firewall - Web Application & Web Services Security integrated...
Thomas Malmberg
 
What the fuzz
Christopher Frenz
 
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
API Security with Postman and Qualys
Postman
 
Secure Code Warrior - Robust error checking
Secure Code Warrior
 
Windows 10 and the cloud: Why the future needs hybrid solutions
Alexander Benoit
 
Secure Code Warrior - Authentication
Secure Code Warrior
 
Fortify dev ops (002)
Madhavan Marimuthu
 
Denali Sql Server Security
Gabriel Villa
 
Security Testing - A complete Guide
BugRaptors
 
Web server scripting - Security Issues
John Robinson
 
Owasp top 10 Vulnerabilities by cyberops infosec
Cyberops Infosec LLP
 
Overview of RateSetter web security
RateSetter
 
CSS17: Houston - Stories from the Security Operations Center
Alert Logic
 
IT security : Keep calm and monitor PowerShell
ManageEngine
 

Similar to Top Keys to create a secure website (20)

PPTX
Tips for web security
kareowebtech
 
PPTX
Tips for web security
kareowebtech
 
PDF
10 server security hacks to secure your web servers
Temok IT Services
 
PDF
Case - How to protect your website
Phannarith Ou, G-CISO
 
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
PDF
Elementary-Information-Security-Practices
Octogence
 
PPTX
Secure programming with php
Mohmad Feroz
 
PDF
CEH Domain 5.pdf
infosec train
 
PDF
Domain 5 of the CEH: Web Application Hacking
ShivamSharma909
 
PDF
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
aquacareser
 
PDF
How to Secure Web Apps — A Web App Security Checklist
PixelCrayons
 
PPTX
Web and Mobile Application Security
Prateek Jain
 
PDF
Secure coding guidelines
Zakaria SMAHI
 
PPT
Survey Presentation About Application Security
Nicholas Davis
 
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
F-Secure Corporation
 
PPT
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
PDF
Secure codingguide
David Kwak
 
PDF
Top Application Security Threats
ColumnInformationSecurity
 
PDF
" onclick="alert(1)
slideshareperson2
 
PDF
<marquee>html title testfsdjk34254</marquee>
slideshareperson2
 
Tips for web security
kareowebtech
 
Tips for web security
kareowebtech
 
10 server security hacks to secure your web servers
Temok IT Services
 
Case - How to protect your website
Phannarith Ou, G-CISO
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
Elementary-Information-Security-Practices
Octogence
 
Secure programming with php
Mohmad Feroz
 
CEH Domain 5.pdf
infosec train
 
Domain 5 of the CEH: Web Application Hacking
ShivamSharma909
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
aquacareser
 
How to Secure Web Apps — A Web App Security Checklist
PixelCrayons
 
Web and Mobile Application Security
Prateek Jain
 
Secure coding guidelines
Zakaria SMAHI
 
Survey Presentation About Application Security
Nicholas Davis
 
Cyber security webinar 6 - How to build systems that resist attacks?
F-Secure Corporation
 
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Secure codingguide
David Kwak
 
Top Application Security Threats
ColumnInformationSecurity
 
" onclick="alert(1)
slideshareperson2
 
<marquee>html title testfsdjk34254</marquee>
slideshareperson2
 
Ad

Recently uploaded (20)

PDF
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
PDF
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PPTX
Optimization_Techniques_ML_Presentation.pptx
farispalayi
 
PPTX
L1A Season 1 ENGLISH made by A hegy fixed
toszolder91
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PDF
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
PPTX
L1A Season 1 Guide made by A hegy Eng Grammar fixed
toszolder91
 
PPTX
internet básico presentacion es una red global
70965857
 
PDF
Build Fast, Scale Faster: Milvus vs. Zilliz Cloud for Production-Ready AI
Zilliz
 
PPTX
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PPTX
PM200.pptxghjgfhjghjghjghjghjghjghjghjghjghj
breadpaan921
 
PPTX
INTEGRATION OF ICT IN LEARNING AND INCORPORATIING TECHNOLOGY
kvshardwork1235
 
PPT
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
Optimization_Techniques_ML_Presentation.pptx
farispalayi
 
L1A Season 1 ENGLISH made by A hegy fixed
toszolder91
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
𝐁𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓
hokimamad0
 
L1A Season 1 Guide made by A hegy Eng Grammar fixed
toszolder91
 
internet básico presentacion es una red global
70965857
 
Build Fast, Scale Faster: Milvus vs. Zilliz Cloud for Production-Ready AI
Zilliz
 
一比一原版(SUNY-Albany毕业证)纽约州立大学奥尔巴尼分校毕业证如何办理
Taqyea
 
PM200.pptxghjgfhjghjghjghjghjghjghjghjghjghj
breadpaan921
 
INTEGRATION OF ICT IN LEARNING AND INCORPORATIING TECHNOLOGY
kvshardwork1235
 
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
Ad

Top Keys to create a secure website

  • 1. Keys To Create A SecureKeys To Create A Secure WebsiteWebsite
  • 2. The NeedThe Need You may think your website haven't anything that is worth for anyone to be hacked but it is found that majority of security breaches are used to use your server to setup temporary server and use it as an email relay for Spam instead of stealing your data.
  • 3. Key 1 :Key 1 : Upto Date SoftwareUpto Date Software It is obvious that one should have updated systems all the time but ensuring updates software up to date is somehow vital. This key applies for both servers, the operating system and the software you may running on web.
  • 4. Key 2 :Key 2 : SQL injectionSQL injection Attacker often use SQL injection i.e. a URL parameter to manipulate database. When a standard SQL query is used, it is easy to amend accordingly and insert rogue code to change tables and get information. The key purpose is to use parameterized queries and it easy to implement for majority of web languages which is in use by most of the website design companies.
  • 5. Key 3 :Key 3 : PasswordsPasswords Using a complex password is not always sufficient as much users not like to enforce them for requirement like length, use of special symbols and uppercase letters etc. Instead it should be save with encrypted values and salt the passwords for extra security.
  • 6. Key 4 :Key 4 : SSLSSL SSL protocol is widely used to provide secure connections for communication over the Internet. Your personal information got hacked if medium of communication is not secure.
  • 7. Key 5 :Key 5 : Web Security ToolsWeb Security Tools Once you have done with all your web development tasks, then it comes to check for your website security check. There are many on line free and paid tools available for this check which do provide you details result with low medium and high security alerts. Majority of CMSes has inbuilt security features.
  • 8. Key 6 :Key 6 : Server Side/Form ValidationServer Side/Form Validation It is necessary to implement validation on browser side as well as server side. Malicious code or script can be inserted if failed to do so.
  • 9. Key 7 :Key 7 : File UploadsFile Uploads It can be a big security risk if you allow users to upload files on your website. You can achieve secure file uploading by variety of methods but its more likely suggested that prevent direct access to those uploaded files together. In this way, the files are stored in a separate folder which is outside of the root folder.
  • 10. Key 8 :Key 8 : Displaying Error MessagesDisplaying Error Messages You must be careful regarding the error messages you are displaying while any attempt on your website. Attacker can get user-name and password with an attack that when one of the fields get corrected. You should use general messages like "Incorrect User-name or Password" rather than to mention when a user got query corrected to some extent.
  • 11. Get More Solutions The web application development company that offers endless oppurtunities for its clients. http://clickripplesolutions.com