PHP Development Services - Laitkor |
Securing website
1. The main sets of rules are:
• Validate all inputs
• Sanitize all output
• If using a DBMS consider using parameterized, typed queries.
2. Everyone should learn from the Ashley Madison fiasco. They were virtually uncrackable because they used the built in PHP password hashing library. There are hackers that simply refuse to try due to the amount of resources it would take.
3. Every developer that cares about security might also take into consideration having an independent third party look at the final product. You can start with a friend to take a look or you could go with specialized companies that test your site / app fore holes.
4. However, a programming language has nothing to do with security. It’s the programmer who needs to ensure the safety of his program. There are enough ways to write bad codes.
5. To avoid your PHP web application secure, first try to prevent OWASP’s top 10 security risks. It is advised to use a framework. They have some features which come in handy in handling security threats for e.g. Active Records and Query builder for database transactions, Access controls / filters for authorizations. It is really important that you put both client side and server side validations in case of user inputs.
6. To ensure that your PHP code is secure, you must start learning about all kinds of vulnerabilities, you can easily detect them in your code. Then all you need is to know how to avoid them. Or you could hire some security analyst to break your website without showing your code, and get an idea about all the vulnerabilities.
7. Just by using any particular framework, you won’t be protected from all attacks. After all, these security attacks are not dependent on the framework you use. Try learning about security vulnerabilities and how to detect and avoid them.
A programming language is neither secure nor insecure, in and of itself. The code you write with that language is the important part. You can write insecure code within any “secure” framework, and secure coding requires additional effort.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.