As attacks on sites become more common, solutions to defeat those attacks are created. Security can be daunting for non-technical site owners to understand. Security is complex and technical. Fortunately for us, some of the newer solutions provide explanations and videos.
How much you need to know about security depends on your job and why you are interested. If you only want to secure your personal blog or site, your hosting company will provide at least some protection. Unfortunately, it may not be enough protection.
Hackers trying to access WordPress blogs are very common as are hackers getting into eCommerce sites. Prevention is always far superior to having to repair the damage hackers can do. Fortunately, there are solutions that make it easier to block hackers and prevent them from accessing our sites.
This video about FireBlade security provides a visual idea what security solutions do:
Security solutions like FireBlade provide part of what is required. Your hosting company should provide additional security measures. The infographic below contains a more complete list of what is required:
Your hosting company should have a risk management framework that contains:
A continuously updated written document detailing how physical and IT assets are protected.
Automated solutions such as the one explained in the video above are employed to handle this aspect.
Virtual perimeters are used to enhance network protection and protection against DDoS (Distributed Denial of Service) attacks.
Protection of the physical computer room and network from attacks and weather related dangers.
According to the DRM dictionary: “A security paradigm according to which the platform (e.g. Operating System and possibly hardware) protects software programs from attack, so that the programs do not need to protect themselves.”
According to Iowa State University: “Information assurance (IA, InfAs) is the practice of managing information-related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non-repudiation.”
Controlling physical access and only granting access to those who need it. Methods of access restriction are elaborated on in the infographic below: