Unit 3 (CSS Notes)
Unit 3 (CSS Notes)
Access control
5. File System
Browser isolation
Web Security
Web security is also known as “Cybersecurity”. It basically means
protecting a website or web application by detecting, preventing and
responding to cyber threats.
Websites and web applications are just as prone to security breaches as
physical homes, stores, and government locations. Unfortunately,
cybercrime happens every day, and great web security measures are
needed to protect websites and web applications from becoming
compromised.
That’s exactly what web security does – it is a system of protection
measures and protocols that can protect your website or web application
from being hacked or entered by unauthorized personnel. This integral
division of Information Security is vital to the protection of websites, web
applications, and web services. Anything that is applied over the Internet
should have some form of web security to protect it.
Threats:
Your website or web application’s security depends on the level of
protection tools that have been equipped and tested on it. There are a few
major threats to security which are the most common ways in which a
website or web application becomes hacked. Some of the top
vulnerabilities for all web-based services include:
SQL injection
Password breach
Cross-site scripting
Data breach
Remote file inclusion
Code injection
Preventing these common threats is the key to making sure that your web-
based service is practicing the best methods of security.
Web Security also protects the visitors from the below-mentioned
points –
Thus, web security is easy to install and it also helps the business people
to make their website safe and secure. A web application firewall
prevents automated attacks that usually target small or lesser-known
websites. These attacks are born out by malicious bots or malware that
automatically scan for vulnerabilities they can misuse, or cause DDoS
attacks that slow down or crash your website.
Thus, Web security is extremely important, especially for websites or
web applications that deal with confidential, private, or protected
information. Security methods are evolving to match the different types
of vulnerabilities that come into existence.
Differences between HTTP and HTTPS
HTTP stands for HyperText Transfer Protocol and HTTPS stands
for HyperText Transfer Protocol Secure.
In HTTP, URL begins with “http://” whereas URL starts with
“https://”
HTTP uses port number 80 for communication and HTTPS uses
443
HTTP is considered to be insecure and HTTPS is secure
HTTP Works at Application Layer and HTTPS works at
Transport Layer
In HTTP, Encryption is absent and Encryption is present in
HTTPS as discussed above
HTTP does not require any certificates and HTTPS needs SSL
Certificates
HTTP speed is faster than HTTPS and HTTPS speed is slower
than HTTP
HTTP does not improve search ranking while HTTPS improves
search ranking.
What is CSRF?
Cross-site request forgery (also known as CSRF) is a web security
vulnerability that allows an attacker to induce users to perform actions
that they do not intend to perform.
In a successful CSRF attack, the attacker causes the victim user to carry
out an action unintentionally. For example, this might be to change the
email address on their account, to change their password, or to make a
funds transfer. Depending on the nature of the action, the attacker might
be able to gain full control over the user's account. If the compromised
user has a privileged role within the application, then the attacker might
be able to take full control of all the application's data and functionality.
How does CSRF work?