Five Web Application Security Myths - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Web Application Security Myths-2 Next

Secure Sockets Layer (SSL) is probably the best know and least understood Web security measure in our protection arsenal. As you may know, SSL is a means of encrypting data passing between your browser and Web server. When you are conducting private transactions (i.e., financial, medical), your transmitted data does need to be encrypted, or it can be easily read by anyone who “sniffs” your information along the way.

While an argument can be made that SSL (encrypted data) was the single most important technology piece in the growth of the internet as the transactional system is today; one cannot extend that premise to say it is the only technology piece that is required.

The myth behind SSL is the prevalent belief that SSL is all there is for Web security keep the bad guys from looking at my transmitted data and I’m OK. The thinking goes to say, as long as the bad guys cannot read data being sent between your browser and Web server, all is safe. Unfortunately, this is like saying your home privacy is safe as long as no one can tap into your telephone line. What about your door locks, cleaning people who might spend every Tuesday at your home (perhaps alone), or the credit card information you put to the curb every month?

So, yes, SSL is essential to Web security, but it is only a small part of the total picture. SSL will not solve your security concerns.

Protecting your website from hackers is tough. The battle between the good guys (you) and the bad guys (the hackers) is an ever escalating war where a misstep on your part may mean a breached site. But, many companies fail to even make the first step towards security because of misconceptions and security myths, either believing simple security protections are sufficient or thinking they really do not have to worry about hackers. This slideshow features five common Web security myths, identified by Alan Wlasuk, managing partner at 403 Web Security, a subsidiary of WDDinc.

More Slideshows:

Seven Tips to Help Professionals Negotiate Like Ninjas Strengthen your confidence and impact at work.

Five Unique Ways to Use a Log Management Solution Log management solutions enable companies to monitor and analyze all kinds of activity happening on their networks.

Top Ten Desktop Virtualization Myths A closer look at the differences between Virtual Desktop Infrastructure and Intelligent Desktop Virtualization.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.