Methods of Verification
At this point, you have had opportunity to know the foundations the security in the Web, themain aspects related to some of the vulnerabilities found commonly in the web servers used
to lodge the different sites with which we routinely interact when browsing in Internet, and the
form in which different defects in the development of web applications, affect the security
and/or the privacy of the users in general.
On the other hand, you have learned some of the technologies on which we rely to protect
our servers and also our privacy. However, probably at this moment, you are realizing
questions such as: I am safe, now that I have taken the corresponding actions? Is my system
safe? The developers that have programmed some of the functionalities that I have used in
my Web site, have they taked care of ensuring aspects to the security? How I can verify these
aspects?
As probably you have thought, it is not enough to apply manufacturer updates or trust the
good intentions of the developer, when your security or privacy is concerned. In the past,
there have been several cases in which manufacturer's patches corrected one vulnerability,
but causing another problem in the system, or once patched discovered a new vulnerability.
Due to this and other reasons, you will have to consider, that is absolutely necessary to verify
frequently the implemented systems, in order to the system "remains" safe.
Luckily, many people have developed in their own time, some "Methods of Verification", most
of which are available free, so that we all may take advantage of the benefits of its use. Such
they are based on the experience of hundreds of professionals, and include numerous "good
practices" regarding implementing technology in safe form. Therefore, it is recommended,
that you adopt these methodologies at the time of making your tasks of verification.
No comments:
Post a Comment