Web Design Principles and System Security Essentials
Principles of Webpage Design
There are two distinct phases in the design of webpages:
- Layout: It organizes written and multimedia spaces and contents.
- Interface: The set of commands and methods that facilitate the interaction between the user and the system.
We cannot move ahead with the creation of a webpage without knowing what we want to show, the topic, and the quantity of information that we will include. We shall also decide on the title, header, and logo, since they provide a sense of continuity and greater professionalism.
Content Management Systems (CMS)
Content Management Systems (CMS) are applications installed on a server that enable the creation of dynamic webpages and allow us to design the site independently of the content. When we administer a CMS, we define an aspect in accordance with PHP templates created by us or provided by user communities.
These templates work as an empty presentation box into which we create the webpage by adding articles, news, and downloadable files. The dynamism of these pages lies in the possibility that any user can update them by adding news, content articles, or participating in forum conversations.
Web Accessibility Standards
When we talk about web accessibility, we refer to the design techniques that allow any person with a physical disability or without specific technological resources to access information.
Technical Accessibility
If we create a webpage with spectacular designs and beautiful pictures but slow loading speeds, we are creating a site that is not very accessible.
Physical Accessibility
If we imagine the different scenarios that a person with a physical disability can encounter while surfing the web, we will discover that there are still considerable accessibility barriers.
Threats to Computer Systems
Physical Threats
A physical threat is a potential cause of an incident that may result in loss or physical damage to computer systems. These include:
- Internal: Threats such as fire, unstable power supply, or humidity in hardware rooms.
- External: Natural disasters including lightning, floods, and earthquakes.
- Human: Theft, vandalism of infrastructure, disruption, and accidental or intentional errors.
Non-Physical (Logical) Threats
A non-physical threat is a potential cause of an incident that may result in the loss of sensitive information, corruption of system data, or the disruption of business operations. Common types include:
- Viruses
- Trojans
- Worms
- Spyware
Protecting System Resources
To protect against malware, an organization can use anti-virus software. In addition to software, organizations should implement control measures on the usage of external storage devices and restrict access to websites likely to host unauthorized programs.
Unauthorized access to resources can be prevented by authentication methods such as strong passwords, smart cards, or biometrics. Furthermore, intrusion-detection and prevention systems are essential to protect against denial-of-service attacks and other malicious activities.
