preview

The Importance Of Security Through Design

Better Essays

Precautionary measures
The security concerns talked about in the past segment should be tended to with vital prudent steps. Beneath we list a little determination.
Security through Design
As indicated by Gartner, poor application advancement and an absence of oversight when incorporating security best practices and instruments into the System Development Life Cycle(SDLC) are two of the greatest security issues confronting Web 2.0 designers. In the race to ride the tide of these new administrations, Web 2.0 applications may not get a similar level of security examining as customary customer based applications and administrations.
Like different applications, security contemplations ought to be considered at all periods of the SDLC. …show more content…

Hence, they generally have increased security built in. Instead of following a proprietary approach, proven security protocols and industry standards should be used. If open source software or APIs are used, the software should be tracked to ensure that all license’s are valid for use, and published vulnerabilities from these open source software solutions should be addressed in time

Corporate Governance on Web 2.0
Although current Web 2.0 services are mostly public services, outside the organization, management still needs to be aware of the risks that may impact corporate members who have access to these services. Policies should be established to protect sensitive corporate and/or customer information, and ensure this will not be disclosed in open websites such as blogs. Regular awareness training should also be conducted to educate staff about the company’s IT Security Policy and strengthen security awareness around the risks associated with these new technologies.
To avoid the risks associated with web feeds, only data feeds from reputable sources should be trusted. For application developers who provide web feeds, preventive measures such as white-listing only those necessary HTML tags should be deployed. This can reduce the possibility of XSS attacks on web feeds.
The accompanying are extra prescribed procedures that IT experts ought to consider:
1. Despite of the fact that wikis can prompt more extensive and all the more quickly developing scope

Get Access