Is it enough security to add ushield protection to the https website background?

Source: Internet
Author: User
The website uses https in the background, and all operations (including logon) are POST-based. all operations use the U security for challenge response verification. both MD5 and SHA1 are verified, and only one verification code can be used, all POST data is involved in verification code calculation, and the local directory is fully read-only (Cloud storage is used for uploading, not local )... the website uses https in the background, and all operations (including logon) are POST-based. all operations use the U-shield for challenge/response verification, MD5 and SHA1 dual verification, and all verification codes can only be used once, all POST data is involved in verification code calculation. The local directory is fully read-only (Cloud storage is used for uploading, not local), and the database is accessed only through the intranet. is this safe enough at the code level? Security issues on non-program code levels, such as server vulnerabilities, social engineering, bypass, and DNS intrusion, are not considered.

In addition, the concept of a honeypot system, as long as the system detects any attack behavior, is automatically switched to the honeypot, the background looks exactly the same as the real background, data (except sensitive data, is it better to close all operations in the honeypot?

Reply content:

The website uses https in the background, and all operations (including logon) are POST-based. all operations use the U-shield for challenge/response verification, MD5 and SHA1 dual verification, and all verification codes can only be used once, all POST data is involved in verification code calculation. The local directory is fully read-only (Cloud storage is used for uploading, not local), and the database is accessed only through the intranet. is this safe enough at the code level? Security issues on non-program code levels, such as server vulnerabilities, social engineering, bypass, and DNS intrusion, are not considered.

In addition, the concept of a honeypot system, as long as the system detects any attack behavior, is automatically switched to the honeypot, the background looks exactly the same as the real background, data (except sensitive data, is it better to close all operations in the honeypot?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.