SlideShare una empresa de Scribd logo
1 de 13
Website Security
Name
ID
Introduction
 Ensuring that your website or open web application is secure is critical. Even simple bugs in
your code can result in private information being leaked, and bad people are out there
trying to find ways to steal data. This introductory article won't make you a website security
guru, but it will help you understand where threats come from, and what you can do to
harden your web application against the most common attacks
What is Website
security?
 The Internet is a dangerous place! With great
regularity we hear about websites becoming
unavailable due to denial of service attacks, or
displaying modified information on their home pages.
And other high-profile cases millions of passwords,
email addresses and credit card details have been
leaked into the public domain, exposing website users
to both personal embarrassment and financial risk
What is Website
security?
 The purpose of website security is to prevent any sorts of
attacks. More formally, website security is the act/practice of
protecting websites from unauthorized access, use,
modification, destruction or disruption
Information Security Basics
 A basic understanding of information security can help you avoid unnecessarily leaving your software and sites insecure and
vulnerable to weaknesses that can be exploited for financial gain or other malicious reasons. These articles can help you learn
what you need to know. With this information, you can be aware of the role and importance of security throughout the web
development cycle and beyond into deployment of your content
 Confidentiality, Integrity, and Availability
 Vulnerabilities
 Threats
 Security Controls
Confidentiality, Integrity, and Availability
 Confidentiality:
 It refers to protecting information from being accessed by unauthorized parties. In other words, only the people
who are authorized to do so can gain access to sensitive data.
 Integrity:
 It refers to ensuring the authenticity of information—that information is not altered, and that the source of the
information is genuine.
 you try to connect to a website and a malicious attacker between you and the website redirects your traffic to a
different website. In this case, the site you are directed to is not genuine
 Availability:
 It means that information is accessible by authorized users.
Vulnerabilities
 There are many ways in which vulnerabilities can be categorized. But I will use three high-level vulnerability categories:
software flaws, security configuration issues, and software feature misuse.
 A software flaw vulnerability:
 A software flaw vulnerability is caused by an unintended error in the design or coding of software. An example is an
input validation error, such as user-provided input not being properly evaluated for malicious character strings and
overly long values associated with known attacks
 A security configuration:
 A security configuration setting is an element of a software’s security that can be altered through the software itself
 A security configuration issue vulnerability involves the use of security configuration settings that negatively affect the
security of the software.
 A software feature misuse:
 A software feature misuse vulnerability is a vulnerability in which the feature also provides an avenue to compromise
the security of a system. These vulnerabilities are caused by the software designer making trust assumptions that
permit the software to provide beneficial features, while also introducing the possibility of someone violating the trust
assumptions to compromise security
Threats
A threat is any circumstance or event with the potential to adversely impact data or systems via unauthorized access,
disclosure, or modification of information, and denial of service. Threats may involve intentional actors or unintentional actors.
Threats can be local, such as a disgruntled employee, or remote, such as an attacker in another geographical area.
A threat source is the cause of a threat, such as a hostile cyber or physical attack, a human error of omission or commission, a
failure of organization-controlled hardware or software, or other failure beyond the control of the organization. A threat event is
an event or situation initiated or caused by a threat source that has the potential for causing adverse impact.
Network traffic typically passes through intermediate computers, such as routers, or is carried over unsecured networks, such as
wireless hotspots. Because of this, it can be intercepted by a third party. Threats against network traffic include the following:
Threats against network traffic
Eavesdropping:
• Information remains intact, but its
is compromised. For example, someone
could learn your credit card number,
record a sensitive conversation, or
intercept classified information.
1
Tampering:
• Information in transit is changed or
replaced and then sent on to the
recipient. For example, someone could
alter an order for goods or change a
person's resume
2
Impersonation:
• Information passes to a person who
poses as the intended recipient.
3
Security Control
 Sensitive data should be protected based on the potential impact of a loss of confidentiality, integrity, or
availability. Protection measures tend to fall into two categories.
 First, security weaknesses in the system need to be resolved
 Second, the system should offer only the required functionality to each authorized user, so that no one
can use functions that are not necessary
 There are three types of security controls
 Management controls: The security controls that focus on the management of risk and the management
of information system security
 Operational controls: The security controls that are primarily implemented and executed by people
 Technical controls: The security controls that are primarily implemented and executed by the system
through the system's hardware, software, or firmware
Few Tips to Consider
 Keep all software updated
 Build layer of security around your site
 Switch to HTTPS
 Use strong passwords, change regularly
 Make Admin directories tough to spot
 Conclusion:
Few Tips to Consider
 Most of us go through life with the philosophy ‘It won’t happen to me’. However, that
philosophy has been proven not t be true in the world of online security. A successful
attack on your site not only leads to compromising of users’ data and your own
information, it can also lead to a blacklisting of your site by Google and other search
providers as your infected site risks spreading malicious content throughout the web
Website security

Más contenido relacionado

La actualidad más candente

Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
Nimisha Walecha
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security Attacks
Centextech
 

La actualidad más candente (20)

How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
System Security
System SecuritySystem Security
System Security
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Security threats
Security threatsSecurity threats
Security threats
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it business
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security Attacks
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 

Similar a Website security

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
ronak56
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 

Similar a Website security (20)

Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 

Más de RIPPER95 (6)

Spain
Spain Spain
Spain
 
Italy politics and social lives
Italy politics and social livesItaly politics and social lives
Italy politics and social lives
 
Fire project
Fire projectFire project
Fire project
 
Android and IOS
Android and IOSAndroid and IOS
Android and IOS
 
Drug policy in mexico
Drug policy in mexicoDrug policy in mexico
Drug policy in mexico
 
Cyber security
Cyber securityCyber security
Cyber security
 

Último

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 

Último (20)

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Website security

  • 2. Introduction  Ensuring that your website or open web application is secure is critical. Even simple bugs in your code can result in private information being leaked, and bad people are out there trying to find ways to steal data. This introductory article won't make you a website security guru, but it will help you understand where threats come from, and what you can do to harden your web application against the most common attacks
  • 3. What is Website security?  The Internet is a dangerous place! With great regularity we hear about websites becoming unavailable due to denial of service attacks, or displaying modified information on their home pages. And other high-profile cases millions of passwords, email addresses and credit card details have been leaked into the public domain, exposing website users to both personal embarrassment and financial risk
  • 4. What is Website security?  The purpose of website security is to prevent any sorts of attacks. More formally, website security is the act/practice of protecting websites from unauthorized access, use, modification, destruction or disruption
  • 5. Information Security Basics  A basic understanding of information security can help you avoid unnecessarily leaving your software and sites insecure and vulnerable to weaknesses that can be exploited for financial gain or other malicious reasons. These articles can help you learn what you need to know. With this information, you can be aware of the role and importance of security throughout the web development cycle and beyond into deployment of your content  Confidentiality, Integrity, and Availability  Vulnerabilities  Threats  Security Controls
  • 6. Confidentiality, Integrity, and Availability  Confidentiality:  It refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data.  Integrity:  It refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine.  you try to connect to a website and a malicious attacker between you and the website redirects your traffic to a different website. In this case, the site you are directed to is not genuine  Availability:  It means that information is accessible by authorized users.
  • 7. Vulnerabilities  There are many ways in which vulnerabilities can be categorized. But I will use three high-level vulnerability categories: software flaws, security configuration issues, and software feature misuse.  A software flaw vulnerability:  A software flaw vulnerability is caused by an unintended error in the design or coding of software. An example is an input validation error, such as user-provided input not being properly evaluated for malicious character strings and overly long values associated with known attacks  A security configuration:  A security configuration setting is an element of a software’s security that can be altered through the software itself  A security configuration issue vulnerability involves the use of security configuration settings that negatively affect the security of the software.  A software feature misuse:  A software feature misuse vulnerability is a vulnerability in which the feature also provides an avenue to compromise the security of a system. These vulnerabilities are caused by the software designer making trust assumptions that permit the software to provide beneficial features, while also introducing the possibility of someone violating the trust assumptions to compromise security
  • 8. Threats A threat is any circumstance or event with the potential to adversely impact data or systems via unauthorized access, disclosure, or modification of information, and denial of service. Threats may involve intentional actors or unintentional actors. Threats can be local, such as a disgruntled employee, or remote, such as an attacker in another geographical area. A threat source is the cause of a threat, such as a hostile cyber or physical attack, a human error of omission or commission, a failure of organization-controlled hardware or software, or other failure beyond the control of the organization. A threat event is an event or situation initiated or caused by a threat source that has the potential for causing adverse impact. Network traffic typically passes through intermediate computers, such as routers, or is carried over unsecured networks, such as wireless hotspots. Because of this, it can be intercepted by a third party. Threats against network traffic include the following:
  • 9. Threats against network traffic Eavesdropping: • Information remains intact, but its is compromised. For example, someone could learn your credit card number, record a sensitive conversation, or intercept classified information. 1 Tampering: • Information in transit is changed or replaced and then sent on to the recipient. For example, someone could alter an order for goods or change a person's resume 2 Impersonation: • Information passes to a person who poses as the intended recipient. 3
  • 10. Security Control  Sensitive data should be protected based on the potential impact of a loss of confidentiality, integrity, or availability. Protection measures tend to fall into two categories.  First, security weaknesses in the system need to be resolved  Second, the system should offer only the required functionality to each authorized user, so that no one can use functions that are not necessary  There are three types of security controls  Management controls: The security controls that focus on the management of risk and the management of information system security  Operational controls: The security controls that are primarily implemented and executed by people  Technical controls: The security controls that are primarily implemented and executed by the system through the system's hardware, software, or firmware
  • 11. Few Tips to Consider  Keep all software updated  Build layer of security around your site  Switch to HTTPS  Use strong passwords, change regularly  Make Admin directories tough to spot  Conclusion:
  • 12. Few Tips to Consider  Most of us go through life with the philosophy ‘It won’t happen to me’. However, that philosophy has been proven not t be true in the world of online security. A successful attack on your site not only leads to compromising of users’ data and your own information, it can also lead to a blacklisting of your site by Google and other search providers as your infected site risks spreading malicious content throughout the web