{"id":6338,"date":"2020-05-11T21:06:59","date_gmt":"2020-05-11T21:06:59","guid":{"rendered":"http:\/\/www.glajumedia.com\/en\/?p=6338"},"modified":"2022-03-22T22:14:04","modified_gmt":"2022-03-22T22:14:04","slug":"cybersecurity-practices-backend-developers","status":"publish","type":"post","link":"https:\/\/www.gmedia.la\/en\/cybersecurity-practices-backend-developers\/","title":{"rendered":"Cybersecurity: Top Practices for Backend Developers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the last 5 years, a <\/span><a href=\"https:\/\/www.entrepreneur.com\/article\/283159\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">study<\/span><\/a><span style=\"font-weight: 400;\"> shows global demand for cybersecurity experts increases each year. Many enterprises and companies have been strongly looking for the top security talents to build a reliable service and secure user\u2019s data.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first step should be to create a more secure product or service by hiring more engineers specialized in cybersecurity. This article will show up some top cybersecurity practices when you are dealing with information from your customers.&nbsp;<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6343\" src=\"http:\/\/www.glajumedia.com\/en\/wp-content\/uploads\/2020\/05\/unnamed.png\" alt=\"\" width=\"512\" height=\"250\" srcset=\"https:\/\/www.gmedia.la\/en\/wp-content\/uploads\/2020\/05\/unnamed.png 512w, https:\/\/www.gmedia.la\/en\/wp-content\/uploads\/2020\/05\/unnamed-300x146.png 300w, https:\/\/www.gmedia.la\/en\/wp-content\/uploads\/2020\/05\/unnamed-510x250.png 510w, https:\/\/www.gmedia.la\/en\/wp-content\/uploads\/2020\/05\/unnamed-480x234.png 480w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<h2><span style=\"font-weight: 400;\">BLOCKING OR THROTTLING ACTION<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The best way to start is by detecting suspicious activities and throttle or block them to prevent any kind of attacks. For example,<\/span><a href=\"https:\/\/www.cloudflare.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"> Cloudflare<\/span><\/a><span style=\"font-weight: 400;\"> can be used as content delivery networks that detect suspicious traffic and block them at their source. Besides, users must not be allowed to do things that will overload the site.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An action that should be throttled, it is the number of requests that users can make. This way, they can\u2019t make a bunch of requests at the same time and crush your system. Also, other suspicious activities carry deleting or editing a huge amount of data at once.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SECURE AND USER-FRIENDLY<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To have a secure and user-friendly site is not always easy to create. You have to make sure that the level of security is high-level which might boost development time. In fact, it is not a visible feature for users and sometimes it could affect the performance of your software. The right balance of cybersecurity and user-friendly is that backend developers need to have practical knowledge of cryptography.&nbsp;<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6344\" src=\"https:\/\/www.gmedia.la\/wp-content\/uploads\/2020\/05\/vector-online-security-data-protection-internet-security.jpg\" alt=\"\" width=\"450\" height=\"450\"><\/p>\n<h2><span style=\"font-weight: 400;\">DRAWBACKS<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The understanding of database security requires management techniques and programing demands such as cryptography and access control (as extra features) than cornerstones.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are two main drawbacks:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trust tokens:<\/span><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Designs rely on storing tokens inside of the infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trust tokens are large attract surface by opening access to many records at once.<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trusting infrastructure<\/span><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">With the designs, this shows up that the infrastructure exists, works properly, and might not be in danger.&nbsp;<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">RISKS OF APIs<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">APIs can carry a lot of power, so you should restrict any powerful action to users that can get into those APIs. Indeed, it is crucial to have authentication and authorization mechanisms because this way you make sure only the people that you allow can access resources. Most of the time, external APIs are secure with an API key or OAuth. Internal APIs are secure with session stores and a JSON web token to see if a user is allowed to do certain activities.&nbsp;<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6341\" src=\"https:\/\/www.gmedia.la\/wp-content\/uploads\/2020\/05\/CYBER-SECURITY.png\" alt=\"\" width=\"426\" height=\"426\"><\/p>\n<h2><span style=\"font-weight: 400;\">CONCLUSION<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">You must run an audit to detect suspicious activity and throttle login attempts, so you can prevent brute attacks to log into your site.&nbsp;<\/span><\/p>\n<p><a href=\"http:\/\/www.glajumedia.com\/en\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Get in touch with us<\/span><\/a><span style=\"font-weight: 400;\"> today! You can find the right developers that possess the best practices related to cybersecurity,&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last 5 years, a study shows global demand for cybersecurity experts increases each year. Many enterprises and companies have been strongly&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6342,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[196,197,195,198],"class_list":["post-6338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-category-more","tag-backend-developers","tag-backend-practices","tag-cybersecurity","tag-cybersecurity-practices"],"_links":{"self":[{"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/posts\/6338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/comments?post=6338"}],"version-history":[{"count":0,"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/posts\/6338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/media\/6342"}],"wp:attachment":[{"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/media?parent=6338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/categories?post=6338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gmedia.la\/en\/wp-json\/wp\/v2\/tags?post=6338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}