The website uses https in the background, and all operations (including logon) are POST-based. all operations use the U security for challenge response verification. both MD5 and SHA1 are verified, and only one verification code can be used, all POST data is involved in verification code calculation, and the local directory is fully read-only (Cloud storage is used for uploading, not local )... the website uses https in the background, and all operations (including logon) are POST-based. all operations use the U-shield for challenge/response verification, MD5 and SHA1 dual verification, and all verification codes can only be used once, all POST data is involved in verification code calculation. The local directory is fully read-only (Cloud storage is used for uploading, not local), and the database is accessed only through the intranet. is this safe enough at the code level? Security issues on non-program code levels, such as server vulnerabilities, social engineering, bypass, and DNS intrusion, are not considered.
In addition, the concept of a honeypot system, as long as the system detects any attack behavior, is automatically switched to the honeypot, the background looks exactly the same as the real background, data (except sensitive data, is it better to close all operations in the honeypot?
Reply content:
The website uses https in the background, and all operations (including logon) are POST-based. all operations use the U-shield for challenge/response verification, MD5 and SHA1 dual verification, and all verification codes can only be used once, all POST data is involved in verification code calculation. The local directory is fully read-only (Cloud storage is used for uploading, not local), and the database is accessed only through the intranet. is this safe enough at the code level? Security issues on non-program code levels, such as server vulnerabilities, social engineering, bypass, and DNS intrusion, are not considered.
In addition, the concept of a honeypot system, as long as the system detects any attack behavior, is automatically switched to the honeypot, the background looks exactly the same as the real background, data (except sensitive data, is it better to close all operations in the honeypot?