Ads Top

7 COMMON SITES ARE COMMITTED TO THE SITES


Waking up to discover that your site has been disfigured is as uncomfortable as it is possible to feel it. Waking up to discover that your users' information has been stolen and your credit cards used by third parties is a liability and a nightmare. Sweet dreams now, everyone!
For website owners and others who do not know how to reinforce their own servers against attacks, it seems a nightmare about which they cannot do much. Well, I have good news: if you have a simple static site on a host that even knows what they are doing, you are probably safe.
But the more complex systems you have in any situation, the more potential security holes there will be. That means more vigilance, and more work to ensure it. On the positive side, people who enter other systems are nothing if they are not predictable. There are a number of quite common types of attacks that can be prevented to a large extent through simple forecasting and planning.
Without further ado, in no particular order, I present some of the most common ways in which people will try to enter your site:

1. SOCIAL ENGINEERING

Ask any security expert in any field: the most common failure point is not software or hardware. They are the people, and their inclination to do silly things. You know, silly things like leaving passwords written in an obvious place, or just giving a user's account to someone over the phone.
It is quite common for a "hacker" to call customer service before doing something else. If you can successfully convince someone to simply give you the information they need, hours, or even days, have been saved. Therefore, by ensuring that your servers are secure, you must also ensure that your employees have security processes to follow.

2. MISSING SECURITY PATCHES

This is still great, believe it or not, and especially in corporate environments. Updating many computers at once is a big problem. Sometimes, updates are delayed by system administrators who just want to make sure that none of the new updates will break their internal software. Others are really restricted, they are forbidden to install updates by the nervous administration.
Sometimes, the IT department is practically fired, and a child in the mail room is told to "know about computers" to keep everything running. Whatever the reason, sometimes security updates are not installed, and systems are vulnerable. For websites, it's generally that nobody is updating WordPress. Just do it.

3. INSECURE THE THIRD PARTY CODE

Programmers are a brilliant race in general, but some have more experience than others. And even among the best, the bugs pass by. Many people start in the world of programming by coding supplements for other software, such as CMS add-ons.
Remember what I said about more complexity that leads to more security holes? Well, more complements mean more complexity. Have all add-ins checked in some way before installing them and update them every time the fixes come out, like the rest of the software.

4. BAD USER SAFETY POLICIES

In this case, the security policy will refer to how you ask your users to contribute to the security of their own account. These policies are things like security questions, requirements for secure passwords, two-factor authentication and even physical account security tokens used by institutions like banks. Email verification is quite common, and one of the easiest ways to handle this. However, it is not completely infallible.
However, having no way to verify who is who is just a recipe for disaster.

5. INJECTION ATTACKS

These are also known as SQL injection attacks, or Sq Lite. Basically, someone enters your website and looks for forms. A contact form, a registration form, a submission form, any of these, will do so as long as they send information directly to a SQL database.
They simply enter basic and common SQL statements into the text fields in the hope of extracting data from their database. And unless the entries in your form are disinfected (removed from things like SQL commands when forms are sent), it will work.

6. DATA LEAKS

Depending on how things are programmed, the data can simply ... leak. URLs may contain confidential information, for example. People can simply search their Google site and find URL with confidential information. If you upload confidential files to unprotected folders on your server, anyone can download them. If people can access the configuration files of their CMS in some way, they probably have a way to enter.
This is not always the result of poor programming either. Sometimes, you can forget about setting the correct permissions on a folder or something like that. Accidental leaks happen.

7. CLICK JACKING

Click jacking occurs in one of two ways: one, someone configures a malicious site with content that seems innocent enough. But when they click on the site, they will do something they do not necessarily want to do (like "I like" on Facebook and do not want them) or take them somewhere they do not want to go.
Two, someone manages to inject code into their site to hijack their clicks, with the same end result. In the worst case, this can cause users to compromise personal information by writing their information on a site that closely resembles their own, but is not.
Powered by Blogger.