Difference between revisions of "Web Site Security"
From MgmtWiki
(→Context) |
(→Full Name and Context) |
||
Line 1: | Line 1: | ||
==Full Name and Context== | ==Full Name and Context== | ||
− | For most of humanity their computer is first and foremost a communications device talking to a collection of [[Web Site]]s who must be trusted by the user | + | For most of humanity their computer is first and foremost a communications device talking to a collection of [[Web Site]]s who must be trusted by the user to enable a meaningful experience. |
==Context== | ==Context== |
Revision as of 09:52, 16 July 2018
Contents
Full Name and Context
For most of humanity their computer is first and foremost a communications device talking to a collection of Web Sites who must be trusted by the user to enable a meaningful experience.
Context
- The day when a personal computer was for running application for the user is long gone, never to return.
- Today a personal computer depends on cloud based service for nearly all of its functionality.
- Web Site security is becoming widely known as Cyber-Security, probably because that sounds more important somehow.
- This page will only consider the use of a trusted User Agent, typically a web browser from a well-known and trusted vendor.
- For the case of the user allowing a Native App to be installed on their personal device, see the page Native App Security.
Problems
Solutions
- The Web Site exposes its name in a manner that allows the user to make a meaningful trust decision.
References
Organizational Support
- The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of web site software.
- ISACs are member-driven organizations, delivering all-hazards threat and mitigation information to asset owners and operators.