it.ucsf.edu

Application and Web Site Security

Policy Type

Best Practice

By following application and website security best practices, application owners can take proactive steps to significantly reduce or eliminate vulnerabilities in software before deployment. These vulnerabilities potentially provide attackers with the ability take control of a server or computer, which can result in the compromise of UCSF data, personal data, denial of service, loss of service, or damage to a system used by thousands of users. By reducing the numbers of vulnerabilities, UCSF data and personal data is better protected.

 

Here are some sources for application and website security best practices:

 

Web Application and System Vulnerability Scanning

In addition to application and website security best practices, ITS Security and Policy can scan your web server for web application vulnerabilities, such as SQL injection and cross-site scripting (XSS), as well as perform a system vulnerability scan on your system.

For more information visit Application and Website Security services.