Explanation of the causes of increasingly serious WEB Application Security Problems

Source: Internet
Author: User

With the increasing popularity of broadband applications, more and more network users transfer their daily affairs to the Internet. For example, you can transfer funds and pay fees through online banking, purchase stocks and funds through the Internet, and perform online shopping and online games. All these WEB applications are unconsciously changing our daily lives, and WEB applications will be continuously popularized along with the development of the Internet, more and more people are inseparable from various WEB applications. However, this kind of thing that brings us infinite beauty is constantly threatened by various cyber security attacks.
As a result, how to solve the security problem in the WEB application process has become a main area for various security vendors and security experts to actively seek solutions since the day when Internet applications were created. With the development of WEB Application Security Prevention Technology, various types of WEB application security prevention products and solutions have emerged. In addition, with the strong advocacy of various security vendors and security experts, the vast majority of network users are scrambling to apply various security products to their respective PCs, there are several other installation methods, which may be less secure, and the system and software are updated every day as required.

However, even if network users apply a variety of security solutions to their PCs as required, during the WEB application process, all kinds of network security events are still happening on your own, and even become more and more serious. This is not an alarmist statement. It is the most powerful proof that we constantly report WEB security events on the Internet every day.

So why have network users improved their security awareness and implemented corresponding security measures on their own PCs? Instead, the security events of various WEB applications become increasingly serious?

Is this a security product provided by security vendors? Or is the security defense solution provided by security experts inappropriate? Or is the current security technology and products unable to defend against the high level of cyberattacks?

When we are faced with such confusion, it is easy to point the blame for this cause to various security vendors, while lamenting that there are more and more cyber threats, as well as the increasing level of network attack technology and Trojan virus writing technology, it often ignores the fundamental factor that causes this situation: that is, the network user itself.

When some readers see this, they have no question about the above conclusions: How has the fundamental cause of increasingly serious WEB Application Security problems become the network user itself? Some readers can understand this question at this time. below, I will solve your doubts in three ways.

1. network users do not have a clear understanding of the security concepts of personal computers and network applications.

Nowadays, most personal computer network users think that to solve the security problem of network applications, you only need to install one or more security software in the PC. As a result, we are always superstitious about using the security software of some security vendors and constantly updating them. Then I thought that all the operations on the network have been protected by these security software, and the security problem should have been related to my own bye-bye. However, if you think too well, sometimes it is not satisfactory, and security problems will not decrease or decrease.

This is mainly because network users think that after security software is installed, the system and WEB applications are completely secure, and therefore they think that they can browse dangerous websites, or operations such as pirated software that may be bound with Trojans will be safe. Especially after the system's security software detects several Trojan viruses or intercepts several network attacks, it is considered that it is already absolutely safe. As a result, a website that did not dare to go to is now directly accessible. software that did not dare to run before is now opened immediately, and you even want to download a few Trojan Horse samples to try. It is precisely the incorrect understanding of computer and network security prevention methods by network users, which has become one of the reasons for security incidents not to be reversed after security prevention measures are implemented in WEB applications.

So how should network users understand the security defense concepts of personal computers and network applications?

Network users should understand that personal computers and network security prevention cannot be solved by one or more security technologies. Security Prevention is a continuous system process, and so far, there is no absolute security. This is due to computer hardware and software design defects, as well as the openness of the Internet design itself. Therefore, network users should not be superstitious about a certain type of security products, but should follow the "Barrel Principle" when considering the security protection of computers and network applications ", starting from the shortest piece of wood in the security phase, use the corresponding system vulnerability analysis tools to carefully analyze the possible storage vulnerabilities of personal computers and fully understand the various resources on the system to be protected, then develop an effective security policy for them and resolutely implement it on this computer.

This security policy is implemented only on each independent computer. It consists of one or more security methods, such as anti-virus software, firewall, and host-based intrusion detection systems. We need to develop a relatively balanced strategy for these security methods to maximize their effects. In addition, security protection should be used throughout the entire life cycle of personal computers, and security software should be adjusted over time based on new security threats.

2. Insufficient technical skills in computer and network applications of network users

A large number of PC users I have been dealing with have some knowledge about network security issues and installed some security software on the PC. However, however, it never pays much attention to computing and network application technologies. In their opinion, computer technicians care about such things, but they have nothing to do with themselves. using PCs is nothing more than daily office work, online browsing, chatting, and games, you only need to know how to perform these operations. In addition, I think that if security software is installed in the PC, there should be no problem. Even if something goes wrong, it can be handled by a computer company. Therefore, many users' computer and network application technologies are generally not high. Some even require the help of others to install the Windows XP operating system and some application software, not to mention the security settings of the system and network application software, as well as the necessary settings and updates for the security software installed on the PC.

However, due to the openness of the design of the interconnected network and the increasing technical level of network attackers, coupled with the defects in computing software and hardware design, in the network application process of computers, it is inevitable to be vulnerable to security threats from the network. In addition, such threats will be stored for a long time, and the attack methods and levels will continue to improve. In the face of these security problems, it is far from enough to rely solely on the help of a certain security product or computer professional. Because any security product will never know which new security threats will be generated, and which technology will be used to write and attack these security threats, in addition, the latest zero-day vulnerabilities of software and hardware are constantly discovered, and zero-day attacks using these zero-day vulnerabilities will emerge one after another. Moreover, some security product companies or computer company technicians cannot understand the content and protection methods that users need to protect in a short time.

In this way, if a network security event occurs during the WEB application process, if the network user does not know some basic computer and network application knowledge, not only will these security faults not be solved in a timely manner, the problems may be further expanded due to some improper operations of users. In addition, every time a computer security incident occurs, technical staff of the computer company are required to handle it. This not only increases the processing time of the security incident, but also increases the maintenance cost of the computer.

In fact, network users can perform corresponding security settings on the operating system and network software, and use some security software and correct security solutions, to control network security threats within the acceptable level. Sometimes, when security software does not play a role, you can also manually clear these security threats, at least to minimize the problems caused by network security threats. However, understanding how to prevent network security threats and how to manually clear Trojans or viruses requires each network user to have certain computer and network-related technical knowledge.

In fact, it is very easy for network users to understand computer and network applications and security protection knowledge through the Internet. As long as we have ideas in this area, have the perseverance to understand this knowledge, and then reduce the time spent on surfing the Internet, playing games, and watching movies every day, we will spend more time learning this knowledge, after a while, we will find less and less dependence on network security software and technical staff of computer companies, and find it easier to solve problems caused by network security threats. This laid a solid technical foundation for Secure WEB applications.

3. Internet users' curiosity and low-cost psychology, as well as improper network operations

Looking at the frequent successes of cyber security threats, such as hacker attacks, network viruses, trojan programs, and phishing, we can analyze the security incidents that have already occurred, A large part of these problems are caused by the curiosity and low-cost psychology of network users and the improper operations of network users.

The following describes the main attack methods used by several attackers to attack network users by exploiting their curiosity and low-cost psychology, as well as improper network operations:

(1) attacks through social engineering

For example, if a company's staff impersonates a company, the system needs to be upgraded or used for other reasons by calling online users or sending emails and text messages, ask users to provide important information related to the company's business to obtain the information they want. There are many ways of social engineering attacks. This is only one of them.

For social engineering attacks, network users tend to trust each other's requirements easily because they do not have a detailed understanding or confirmation of the phone number and email address they have received, disclose all the required information to the attacker. At the end of the attack, the attacker does not even understand the cause of economic losses.

In fact, for the prevention of social engineering attacks, users need to be vigilant, and must confirm the calls from unfamiliar calls or calls from self-proclaimed company leaders or technicians, this is especially true when these people ask us to provide the corresponding privacy information over the phone. In addition, do not trust other methods of social engineering attacks, such as emails asking us to confirm logon information, you must first confirm the items mentioned in the email before proceeding with the correct handling.

(2) Use a network user's ignorance of network knowledge, as well as careless and easy-to-believe psychology to launch phishing attacks

There are also many phishing attacks, one of which is that the attacker first creates a website with a similar domain name and interface with a company website, for example, to create a fake online banking website, make sure that the content and layout of the fake website are exactly the same as those of the formal online banking website, then, users are tempted to log on to the fake online banking website through various methods. Once some network users trust the information, coupled with carelessness, they will not confirm the domain names of these websites, then, after entering the online banking account and logon password on these "Li Gui" websites, the user will have to regret it.

For

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.