SlideShare a Scribd company logo
Basic Security Requirements
Basic Security RequirementsWeb site security is about keeping strangers out but at the same time allowing controlled access to a network.
Sometimes, achieving both of these elements can be very difficult.
However, this raises the question of whether there is any real difference between security in a paper-based business organisation and an electronic-based business organisation.Basic Security RequirementsSecurity Requirements
Basic Security RequirementsSecurity requirements for a website and web server primarily depend upon the purpose of the website.
Obviously the more sensitive data required the more secure the web server and website needs to be.Basic Security RequirementsTo determine the basic security requirements of an organisation, the following issues needed to be considered:What needs to be protected?
How can the organisation educate users on good security practices?
Does the organisation have an effective system backup and storage plan?
Is system security regularly monitored and maintainedBasic Security RequirementsPasswords
Basic Security RequirementsChoosing a secure password is one of the easiest and least expensive ways to guard against unauthorised access.
Unfortunately, too many people prefer to use an easy-to-remember password.
If your password is obvious to you, however, it may also be easy for a cracker to figure out.
The following guidelines for selecting passwords should be part of your organisations security policy.Basic Security RequirementsIt is especially important for administrators to choose difficult passwords, and also to keep passwords confidential and to change them frequently.Basic Security RequirementsTips for making and keeping passwords secure include the following:Do not use familiar information, such as your birth date, anniversary, pet’s name, child’s name, spouse’s name, own name or nickname, user ID phone number, address, or any other words or numbers that others might associate with you.
Do not use any word that might appear in a dictionary.  Crackers can use programs that try a combination of your user ID and every word in a dictionary to gain access.Basic Security RequirementsTips for making and keeping passwords secure include the following:Make the password longer than six characters – the longer, the better.
Choose a combination of letters and numbers; add special characters, such as exclamation marks or hyphens, if allowed.

More Related Content

PPTX
Introduction to Cryptography
PPTX
Cryptography
PPTX
Symmetric and asymmetric key
PPTX
What is Cryptography and Types of attacks in it
PPTX
Introduction to Network Security
PPTX
Network security
PPT
Security Design Principles.ppt
PDF
Public key Infrastructure (PKI)
Introduction to Cryptography
Cryptography
Symmetric and asymmetric key
What is Cryptography and Types of attacks in it
Introduction to Network Security
Network security
Security Design Principles.ppt
Public key Infrastructure (PKI)

What's hot (20)

PPTX
x.509-Directory Authentication Service
PPTX
Security in Windows operating system
PPTX
Brute force-attack presentation
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Symmetric and Asymmetric Encryption
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPT
Symmetric & Asymmetric Cryptography
PPTX
Malicious software and software security
PPTX
The CIA triad.pptx
PPTX
Kerberos
PPTX
Cia security model
PPTX
Ssl and tls
PPTX
Cyber Security Best Practices
PDF
Electronic mail security
PPTX
Password craking techniques
PDF
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
PPTX
Transport Layer Security (TLS)
PPTX
Protection models
PPTX
Cryptography
x.509-Directory Authentication Service
Security in Windows operating system
Brute force-attack presentation
Network security (vulnerabilities, threats, and attacks)
Symmetric and Asymmetric Encryption
Cybersecurity Attack Vectors: How to Protect Your Organization
Symmetric & Asymmetric Cryptography
Malicious software and software security
The CIA triad.pptx
Kerberos
Cia security model
Ssl and tls
Cyber Security Best Practices
Electronic mail security
Password craking techniques
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Transport Layer Security (TLS)
Protection models
Cryptography
Ad

Similar to Basic Security Requirements (20)

PDF
Small Business Owners.pdf
PDF
Keeping Your Cloud Data in Check
PPTX
How To Plan Successful Encryption Strategy
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PDF
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
PDF
Security in the Cloud: Tips on How to Protect Your Data
PDF
Password Strength Policy Query
PPT
Survey Presentation About Application Security
PDF
Cyber Security Magazine
PPT
3e - Security Of Data
PDF
Security policy.pdf
PPTX
Find Powerful Methods To Fight Against Cyber Threats?
PPTX
Presentation 10.pptx
PPTX
Who Can Benefit from a Cyber-Security Framework in Dubai?
PPTX
IT Security Management -- People, Procedures and Tools
PDF
Altourage presents: Cloud Security
PDF
Data Backup and Recovery.pdf
PPTX
10 things to teach end users
PPTX
information security and backup system
PPTX
APAC Partner Update: SolarWinds Security
Small Business Owners.pdf
Keeping Your Cloud Data in Check
How To Plan Successful Encryption Strategy
Cybersecurity Awareness E-Book - WeSecureApp
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
Security in the Cloud: Tips on How to Protect Your Data
Password Strength Policy Query
Survey Presentation About Application Security
Cyber Security Magazine
3e - Security Of Data
Security policy.pdf
Find Powerful Methods To Fight Against Cyber Threats?
Presentation 10.pptx
Who Can Benefit from a Cyber-Security Framework in Dubai?
IT Security Management -- People, Procedures and Tools
Altourage presents: Cloud Security
Data Backup and Recovery.pdf
10 things to teach end users
information security and backup system
APAC Partner Update: SolarWinds Security
Ad

More from Steven Cahill (20)

PPTX
PPTX
Networking Standards And Protocols
PPTX
Purchasing Equipment
PPTX
The Art Of Typography
PPTX
Quality Management
PPTX
Network Hardware And Software
PPTX
Writing For The Web
PPTX
Writing For The Web
PPTX
Writing For The Web
PPTX
Determining Client And Networking Requirements
PPTX
Introduction To Network Design
PPTX
Planning Your Website
PPTX
Introduction To Networking
PPTX
Markup Documents
PPTX
Confirm Client Requirements
PPTX
Testing Frameworks And Methodologies
PPTX
Browsers
PPTX
Web Standards And Protocols
PPTX
Web Server Web Site Security
PPTX
Disaster Recovery
Networking Standards And Protocols
Purchasing Equipment
The Art Of Typography
Quality Management
Network Hardware And Software
Writing For The Web
Writing For The Web
Writing For The Web
Determining Client And Networking Requirements
Introduction To Network Design
Planning Your Website
Introduction To Networking
Markup Documents
Confirm Client Requirements
Testing Frameworks And Methodologies
Browsers
Web Standards And Protocols
Web Server Web Site Security
Disaster Recovery

Recently uploaded (20)

PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
GamePlan Trading System Review: Professional Trader's Honest Take
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks

Basic Security Requirements

  • 2. Basic Security RequirementsWeb site security is about keeping strangers out but at the same time allowing controlled access to a network.
  • 3. Sometimes, achieving both of these elements can be very difficult.
  • 4. However, this raises the question of whether there is any real difference between security in a paper-based business organisation and an electronic-based business organisation.Basic Security RequirementsSecurity Requirements
  • 5. Basic Security RequirementsSecurity requirements for a website and web server primarily depend upon the purpose of the website.
  • 6. Obviously the more sensitive data required the more secure the web server and website needs to be.Basic Security RequirementsTo determine the basic security requirements of an organisation, the following issues needed to be considered:What needs to be protected?
  • 7. How can the organisation educate users on good security practices?
  • 8. Does the organisation have an effective system backup and storage plan?
  • 9. Is system security regularly monitored and maintainedBasic Security RequirementsPasswords
  • 10. Basic Security RequirementsChoosing a secure password is one of the easiest and least expensive ways to guard against unauthorised access.
  • 11. Unfortunately, too many people prefer to use an easy-to-remember password.
  • 12. If your password is obvious to you, however, it may also be easy for a cracker to figure out.
  • 13. The following guidelines for selecting passwords should be part of your organisations security policy.Basic Security RequirementsIt is especially important for administrators to choose difficult passwords, and also to keep passwords confidential and to change them frequently.Basic Security RequirementsTips for making and keeping passwords secure include the following:Do not use familiar information, such as your birth date, anniversary, pet’s name, child’s name, spouse’s name, own name or nickname, user ID phone number, address, or any other words or numbers that others might associate with you.
  • 14. Do not use any word that might appear in a dictionary. Crackers can use programs that try a combination of your user ID and every word in a dictionary to gain access.Basic Security RequirementsTips for making and keeping passwords secure include the following:Make the password longer than six characters – the longer, the better.
  • 15. Choose a combination of letters and numbers; add special characters, such as exclamation marks or hyphens, if allowed.
  • 16. Do not write down your password or share it with others.
  • 17. Change your password at least every 90 days, or more frequently, if desired.Basic Security RequirementsBackup
  • 18. Basic Security RequirementsWhat happens if your web server crashes? Are all your files lost forever?
  • 19. They’re not lost if you’ve done the right thing and backed up your web site.
  • 20. Backing up means making copies of all its data and putting that backup somewhere safe.
  • 21. There are several different ways in which you can back up your data.
  • 22. You can back it up to what’s called a tape drive, which is a device in your computer that stores data on magnetic tape. Basic Security RequirementsThese used to be very popular for backups, but there are newer, more convenient, less-expensive options available, so they’re not used as much as they used to be.
  • 23. You can back up to a removable drive.
  • 24. This is an easy, convenient way to back up your data.
  • 25. Another option is to back up your data to CD or DVD.Basic Security RequirementsHow often should you back up?
  • 26. Basic Security RequirementsThat depends on how important your data is to you