Friday, September 11, 2015

Methods of Verification

Methods of Verification

At this point, you have had opportunity to know the foundations the security in the Web, the
main aspects related to some of the vulnerabilities found commonly in the web servers used
to lodge the different sites with which we routinely interact when browsing in Internet, and the
form in which different defects in the development of web applications, affect the security
and/or the privacy of the users in general.

On the other hand, you have learned some of the technologies on which we rely to protect
our   servers   and   also   our   privacy.   However,   probably   at   this  moment,   you   are   realizing
questions such as: I am safe, now that I have taken the corresponding actions? Is my system
safe? The developers that have programmed some of the functionalities that I have used in
my Web site, have they taked care of ensuring aspects to the security? How I can verify these
aspects?

As probably you have thought,  it  is not enough to apply manufacturer updates or trust the
good  intentions  of the developer,  when your  security or  privacy  is concerned.   In the past,
there have been several cases in which manufacturer's patches corrected one vulnerability,
but causing another problem in the system, or once patched discovered a new vulnerability.
Due to this and other reasons, you will have to consider, that is absolutely necessary to verify
frequently the implemented systems, in order to the system "remains" safe.

Luckily, many people have developed in their own time, some "Methods of Verification", most
of which are available free, so that we all may take advantage of the benefits of its use. Such
they are based on the experience of hundreds of professionals, and include numerous "good
practices"   regarding  implementing  technology  in  safe  form.  Therefore,   it   is  recommended,
that you adopt these methodologies at the time of making your tasks of verification.


No comments:

Post a Comment