Security!!

5 pts.
Tags:
Risk management
Security protocols
Web security
What security measures are considered when designing a web-application (besides the SSL encryption)? And what technologies are used to protect the application from brute-force, phishing, and pharming attacks."

Answer Wiki

Thanks. We'll let you know when a new response is added.

You need to protect yourself against SQL Injection attacks. If you are worried about someone brute forcing a password, setup a method within the database so that when a user types in a password wrong a counter is ticked. When the values of the counter reaches a number you decide (5, 10, etc) the account is disabled until the person contacts the Customer Service / Help Desk department.

Phishing there isn’t anything you can do about as that is when someone puts up a page that looks like yours on another web site and tries to get people to go to that site. The only defense here is customer education.

Other things to think about are firewalls, DDoS protection, etc.

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following