Skip to main content

HTTP Strict Transport Security strict browser processing or bug prevention or what?

Having a different internet browser makes handy for people whose job is to make sure any web service or application, and their behavior, would not fail before and after making any changes, or upgrade. In our definition, it is that it would not fail regardless of methods, not the geeky ones and without harm of course, applied to access, in a regular way, a resource designed and made available to the public. We think that premise, which is to "make sure it will work, somehow a little better", characteristic of our work @𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, is true to any technology designed for use mainstream but which this post is toned or using such example, specifically. Do you know what causes a browser to process a web service or application like this in the image? We would see it is due to an HSTS, primarily, not being processed or some bug prevented to load by, in here we have, Microsoft Edge Dev browser where a notice is produced. Then it could be that, with other browsers, this is not at

Deal security

Do not talk security attacks unless things, in the first place, have already been ironed out. This can be taken up but not as the primary issue yet. It goes to say, particularly if information infrastructure is still being laid out, that ICT strategies e.g. few to consider are usability, capacity and security, and in general, have to be dealt with first and foremost.

With all the tested technology specifically for security purposes, why organizations still cannot get rid of the attacks?

The following few might be one of the answers:

IPv4 is really not secure

There is two or more, if not a single straight way, to mitigate it. If it is done correctly organization can still be secure.

Plan IPv6 and turn it on now. Caveat: We still have to see how capable it is however the next generation Internet protocol has been addressed to have security integrated in the design.

Funding not enough to address security

Fund it or what many advised it never connect to the Internet.

Security not part of planning and design or had been overlooked and perceived not to be as important that time, just like when IPv4 was being developed

Good ICT programs would not only single out to address, like for instance, security. ICT presents so many opportunities and it needs to be planned and carried out very carefully. Whatever the outcome is, we know where we are moving towards, either we are doing good or bad business. Many organizations depends on IT to maximize delivery of services and inaccessible of information in the network, might derail the day with all concerned stakeholders and the overall operations so to speak. 

Comments

Popular posts from this blog

[TW] IT documents, audit and leaders

IT documents comes with different names such as the following: - Manual or handbook, - Policies and procedures, - Management systems, - Project plans. In the real world we have various names with unique descriptions and purposes when in fact they could be made to do a uniform direction for which actions are based for the entire IT initiatives, probably the longest in IT lifecycle is operation. The problem is our inclination on something else which is wrong. IT remains an IT area. Business remains a business area. The same problem is carried out when we conduct IT audit. Most audit are missing the gists in which IT is being used by businesses. We once said that an effective IT audit is conducted by IT people themselves but there is something wrong with that even. Business and accounting people have been doing it with a different bias and preconceived notions which doesn't make the cut for IT direction and audit respectively. Leaders play the same game and so the problem continues an

[TW] Technology impact on enterprises, consumer and data

The best time to learn the art and science of technology consulting or just the necessary practice required for a business not to be left behind or not to bleed cash unnessentially is now. Technology is magnanimous but it doesn't mean it has to continue being an alien to almost everyone. Technologies surrounding computers, the Internet, programmable devices, sensors, AI, differentiated network convergence and decentralized systems, data and content are gaining an unprecedented development and adaptation within, and greatly affecting, enterprises, societies and their people. It must be the more powerful that everyone become a learned stakeholder, not just an end-user and leave everything to the vendor, service provider and their technology counterparts. Smart cities are a giant technological upgrade and the experience must make people deal more for their lives in a better way. Why make everyone learn? Businesses can focus what matters to them. Technology can primarily help organizat