Pages

Thursday, October 21, 2010

Website Security Models

Do you have a website or ready to creating one. What is the first things came into your mind may be from where u got a developer who develop your site. But you need to think again the first and foremost thing one needs to do is to chalk out a security plan and policy model for your site.A security model for your site helps you to finding out what type of site you can create which is secure in terms of privacy.
Here i am going to tell you many security models. you can apply anyone according to your site.

   1. The Open House: In this case, the front door and all the rooms are unlocked. visitors will be free to move around anywhere from any room to any room. This resembles an unprotected site where users do not require any special authentication to view the information.
   2. The Owner: A case where the front door is locked but all the rooms are unlocked. The owner lives in the house and locks the front door in order to keep the neighbours out but once anyone gets into the house, they will be free to go into all other rooms. This is a useful security model if any company gets to go into all other rooms. This is a useful security model if any company gets a lot of outsiders passing through but only want to have its employees access the site.
   3. The Garden Party: An excellent case in which the front door is unlocked but certain rooms inside the house are locked. Anyone may wish to allow people to help themselves to the bar on the front lawn and get into the washrooms but not necessarily into the bedrooms where the owner has kept all of his personal things.
   4. The Paying Guest: This is a more stringent measure than the above in which the front door is locked and certain rooms are locked. The guest has a key to enter the house and is able to get into his room only but the other rooms are off his limits. This model will verify whether or not a user would be allowed to enter the site. Once this user is authenticated, only then may he or she move freely throughout the other rooms as log as s/he has access to them.
   5. The Fort: A locked massive iron gate with barbed wire, front door locked, all rooms also locked, and there is a watchman guarding the house. Simple, unless teh users have the proper credentials or certificates or entry passes, they will not be allowed to get in.

Competitor Analysis

Compititor analysis is used to analylize what your compititors did to get higher ranking in google or major search engines. Compititor analysis is very important task. In compititor analysis we analyze first 5 or 10 compitors and find out what they did in their title tag,meta tag.


 Steps to find what your compititor did:-

   1. Find all related compititors.                                              
   2. Find how important these websites are.
   3. Find link popularity.
   4. Find number of indexed page.
   5. Select a website that rankes #1 in google.
   6. Right click to their homepage. A small popup found click on view page source.
   7. When you click view page source a new window opens that contains all the programming of your compititors site.
   8. Find title tag and meta tag and found out what your compititor did.