logo

Website Promotion Assignment PDF

   

Added on  2021-05-30

11 Pages2672 Words69 Views
 | 
 | 
 | 
Running head: TASK 4TASK 4Name of the UniversityName of the studentAuthor note
Website Promotion  Assignment PDF_1

TASK 41Table of ContentsGuest speaker evaluation............................................................................................................2Evaluations.................................................................................................................................21.Secure Web Development...............................................................................................22.Website Promotion /Marketing and Monitoring.............................................................7References................................................................................................................................11
Website Promotion  Assignment PDF_2

TASK 42Part B: Reflection and Evaluation Reports (LO2)Guest speaker evaluation I was highly impressed with the discussion talk that was provided to us by the guestspeaker. In my project, I personally created a boxing news website. Just like the guest speakermentioned about the importance of encryption in websites, I implemented cryptographicencryption in my personal project. The website which I made was static in nature but stillmanaged to harbor other factors such as SQL injection and session management. Moreover,as per the discussion where the speaker mentioned about irregularities of a project, I couldaseess the situation with my project where I failed to put the login page in every page of thewebsite. The lecture provided by the guest speaker was really helpful to me as it helped me toassess my situation with his general reviews.Evaluations1.Secure Web Development SummariseWeb developers nowadays face massive pressure from clients for delivering theirapplications within a tight deadline. Web systems are computer programs that function byaccessing the intranet or internet. The web development applications includes on lineactivities such as social networks, webmail and inline retail sales. As businesses want fasterdelivery dates for their web development, the web developers face difficulty in implementingall the necessary security aspects to the final application (Taylor, Fritsch and Liederbach2014). Moreover with time, the complexity of the web development increases as developersmake the application to withstand external security attacks, integrate with other devices andadapt with any platform. For every business and organization, secure web development is atopmost priority. Still, only 10% of security researchers agree that proper surveys are carried
Website Promotion  Assignment PDF_3

TASK 43out for determining whether the critical developmental applications are checked before andafter production. Most of the times, the security of the web development is tested after thesource code is written (Conklin et al. 2015). This limits the chances of identifying the flawsthat are inherent to the system and even if proper security checks are carried out, it delays theSDLC stage and often turn out to be a costly endeavour.Develop criteriaProperly analysing the security of the web development is crucial for thesustainability of the application. It has its fair share of advantages. Vulnerabilities can beidentified with the help of multiple analysis techniques. External web applications can bediscovered with the help of web development monitoring and discovery tools. Commonvulnerabilities due to static code that can assist in SQL injection and cross site scripting canbe scanned with the help of static application system testing tools. Moreover, for a secureweb development environment, the flaws that are do not require source code and are inproduction can be tested with the help of Dynamic Application security testing (Peltier 2013).The development team can also use manual penetration to check for vulnerabilities likebusiness logic flaws and authorization issues. During the secure web developmental stage, some security criteria need to beundertaken during the developmental stage. First comes confidentiality. Only authorisedusers should be able to access the vital data that is put into the web application during itsdevelopment. Steps and security gates need to be placed to prevent unauthorised users fromgetting access to the business critical data compromising the entire application. Secondcomes authentication. This criteria is present for identifying the proper user who is logginginto the system. Proper passwords and usernames need to be assigned to each and everymember of the team member who will be accessing the web developmental application. The
Website Promotion  Assignment PDF_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents