Why are application and website security important?
In order to gain control of computers and other network systems, hackers must first find weaknesses (vulnerabilities) within a system or application. These weaknesses can:
- Potentially allow hackers to gain unauthorized access to the system or application
- Be (1) as simple as those resulting from not keeping systems and applications up to date or (2) as complex as insecure development and coding practices
IT Security can use automated scanning tools to help find and identify these weaknesses before a hacker discovers them. By using these tools to find and correct weaknesses on your systems, you help:
- Prevent UCSF and user data from being breached
- Minimize use of the resources required to remediate breaches
The information and video below describe these important security resources, including how to request their activation for your web applications and systems.