ALL >> Education >> View Article
Considerations For Designing A Secure Content Management Strategy
When a Web site is first deployed, all content can be added to the MCITP certification(http://www.mcitp-70-620.com)
when the site is not accessible externally. However, after a site is deployed, it must be updated.
The methods for content management must be securable and secured, and the ability to change and update content must be granted only to authorized users. You can move content to the Web server by using FTP, Microsoft FrontPage publishing, WebDAV,copy and paste, or third-party Web publishing products. There are two security issues with all of these methods: managing authentication and authorization for the file move?ment, and securing the data. Content can also be modified directly on the server, although this is not recommended. Regardless of the method you choose, unautho-rized users or guests should not be able to make content changes on the Web site. The entire process of content management must be secured—from ensuring that proposed changes are approved to securely moving the content from test servers to the microsoft exams(http://www.mcitp-70-620.com)
Web site. To design secure content ...
... management, consider the following items:
The content management approval process New content for Web sites must be approved. A process should be developed and enforced that identifies who can
approve changes to site content.
Content update production New content should be developed and tested on a test server. Developers should not have the ability to write to the production
server, and all changes should be made on the test server first, and then content can be moved to the Web server.
Automatic updates of content Content should be moved to the Web server in a secure manner. Automatic updates from test servers is not a secure method
unless the test server is as secure as the production server. It makes no sense to allow changes made to an insecure server to automatically propagate to the production server. If the test server is compromised, any content the attacker designs will be automatically posed to the production Web server. Instead, consider transfer of content changes to a secondary server and then, after inspection, movement to the production site.
Updating content using FTP An FTP site or sites for updating content should be created on a separate server from the production Web server. Access to FTP
sites can be authenticated, but authentication credentials will traverse the network using clear text. Consider the following options:
Using a Free MCSE PDF questions(http://www.examshots.com/certification/MCSE-2003-50.html)
VPN to access the FTP server
Limiting access to the FTP site to specific servers
Add Comment
Education Articles
1. Time Management 101: Conquer ProcrastinationAuthor: Patuck-Gala
2. Salesforce Devops Training? Streamlining Deployments With Salesforce Devops
Author: Eshwar
3. The Elzee Way Encouraging Curiosity In Toddlers Through Fun Exploration
Author: Elzee
4. Which School Give The Best Icse Kindergarten Experience In Bhopal?
Author: Adity Sharma
5. Data Scientist Vs Mlops Engineer
Author: Gajendra
6. Step-by-step Guide To Web Administrator 313113 Rpl Reports
Author: RPLforAustralia
7. Mba Distance Education
Author: Amrita singh
8. Best Cbse School In Tellapur
Author: Johnwick
9. Cypress Course Online | Cypress Training Course In Hyderabad
Author: krishna
10. Trusted Assignment Help Uk
Author: Masters Assignment Help
11. Mern Stack Training | Best Mern Stack Course
Author: Hari
12. A Complete Guide To Fulfilling Your Mbbs Dreams Abroad
Author: Mbbs Blog
13. Engaging Learning Techniques: Making Education Fun For Your Child
Author: Khushbu Rani
14. Playwright Course Online | Best Playwright Training
Author: Madhavi
15. The Best Gcp Data Engineer Certification Online Training | Hyderabad
Author: SIVA