Webpage Design and Security Threats

Classified in Computers

Written at on English with a size of 3.5 KB.

Design of Webpages

There are 2 distinct phases:

  • Layout: it organizes written and multimedia spaces and contents.
  • Interface: is the set of commands and methods that facilitate the interaction between the user and the system

We cannot move ahead with the creation of a web page without knowing what we want to show, the topic and the quantity of information that we will put in it. We shall also decide the title of the web page, its header and its logo, since they will give a sensation of continuity and greater professionalism.

CMS

The Content Management Systems (CMS) are applications installed on the server that enable us the creation of dynamic web pages and allow us to design the site independently of the content. When we administer a CMS, we define an aspect in accordance with some PHP templates created by us or facilitated by user communities. These templates work as an empty presentation box into which we have to create the web page by adding articles, news, downloadable files, etc. The dynamism of these pages lies in the possibility that any user can update them by adding news, downloadable files, content articles, conversations in the forums, etc.

Web accessibility

When we talk about accessibility in the Web, we refer to the web design technique that allows any person with a physical disability or without the necessary technological resources to access the information.

Technical accessibility: if we create a web page with spectacular designs, beautiful pictures but of slow loading speed, we will be creating a not very accessible web page

Physical accessibility: if we imagine the different scenarios that a person with a physical disability can find surfing the Web, we will discover that there are still considerable accessibility barriers.

Threats to Computer systems

Physical: A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.

  • Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
  • External: These threats include Lightning, floods, earthquakes, etc.
  • Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

Non-Physical: A non-physical threat is a potential cause of an incident that may result in.

  • Loss or corruption of system data
  • Disrupt business operations that rely on computer systems
  • Loss of sensitive information
  • Others

The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats:

  • Virus
  • Trojans
  • Worms
  • Spyware

To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the user's computer.

Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.

Intrusion-detection/prevention systems can be used to protect against denial of service attacks. There are other measures too that can be put in place to avoid denial of service attacks.

Entradas relacionadas: