{"id":117,"date":"2019-03-09T01:11:58","date_gmt":"2019-03-08T23:11:58","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=117"},"modified":"2020-05-31T01:44:00","modified_gmt":"2020-05-30T23:44:00","slug":"what-is-web-security","status":"publish","type":"post","link":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/","title":{"rendered":"What is Web Security?"},"content":{"rendered":"<p style=\"text-align: justify;\">Web Security also known as Cyber Security relates to the securing of websites and servers from online risks. It is aimed at safeguarding the sensitive data by restricting, discovering and responding to attacks. The\u00a0<strong>website security check<\/strong>\u00a0involves scanning for potential vulnerabilities and malware through website security software.<\/p>\n<p style=\"text-align: justify;\">A web security check informs the user of the online risks and advises solutions to address them. The first step to ensuring safety is by preventing and recognizing the risks. On the other hand, it is equally important in knowing the about Hacker, Hacking, Worms, Viruses, Trojans, Spyware, Adware, Rootkits, etc., which can attack and damage, disable, or disrupt host computers and networks.<\/p>\n<p style=\"text-align: justify;\">Malware virus threats are highly infectious and are capable enough to corrupt your data and damage your network and web security. Malware viruses silently trespass your system and execute lots of malicious activities that make your website and network non-responsive.<\/p>\n<p style=\"text-align: justify;\"><strong>What are Web Security Application Tools?<\/strong><\/p>\n<p style=\"text-align: justify;\">A website security tool scans websites at periodic intervals to find out if there is any questionable activity. When a suspicious activity is tracked, the\u00a0website security tools\u00a0immediately brings it to the notice of security experts. Besides that, the key persons in the organization also receive an alert.\u00a0 In simple, the website security tools aid in identifying, and removing of malware which is trying to affect or already lying unnoticed on the business website.<\/p>\n<p style=\"text-align: justify;\"><strong>Web Security Application Tools<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Organization<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#OWASP<\/strong>\u00a0\u2013 The worldwide not-for-profit charitable organization Open\u00a0Web Application Security\u00a0Project (OWASP) is focused on improving the security of software.<\/p>\n<p style=\"text-align: justify;\"><strong>Web Application Firewall<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#ironbee<\/strong>\u00a0\u2013 Yet another open source software. It helps in building a universal\u00a0Web Application Security Tools. The reputable software has a framework for developing a system for securing\u00a0web applications.<\/p>\n<p style=\"text-align: justify;\"><strong>#ModSecurity<\/strong>\u00a0\u2013 The toolkit aids in the real-time\u00a0web application in logging, monitoring, and access control.<\/p>\n<p style=\"text-align: justify;\"><strong>#NAXSI<\/strong>\u00a0\u2013 The high performance, low rules maintenance WAF for NGINX, NAXSI means Nginx Anti XSS &amp; SQL Injection.\u00a0 NAXSI is open-source.<\/p>\n<p style=\"text-align: justify;\"><strong>Scanning \/ Pentesting<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#sqlmap<\/strong>:\u00a0 Being an open source penetration testing tool, the sqlmap automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.<\/p>\n<p style=\"text-align: justify;\"><strong>#OWASP Testing Checklist v4<\/strong>:\u00a0\u00a0 The OWASP Testing Checklist v4 is a more capable tool to testa web vulnerability assessment.<\/p>\n<p style=\"text-align: justify;\"><strong>#ZAP<\/strong>:\u00a0 It is simple to use combined\u00a0Web Application Security Tools for finding vulnerabilities in\u00a0web applications. The Zed Attack Proxy (ZAP) is designed for experts who have hands-on in using a wide range of security tools. Notably, it is ideal for developers and functional testers who are new to penetration testing.<\/p>\n<p style=\"text-align: justify;\"><strong>#w3af<\/strong>:\u00a0 The aim is to create a framework to help you secure your\u00a0web applications by finding and exploiting all\u00a0web application vulnerabilities. It is is a\u00a0Web Application Attack and Audit Framework.<\/p>\n<p style=\"text-align: justify;\"><strong>#PTF<\/strong>: The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.<\/p>\n<p style=\"text-align: justify;\"><strong>#Infection Monkey<\/strong>: A semi-automatic pen testing tool for mapping\/pen-testing networks. Resembles a human attacker.<\/p>\n<p style=\"text-align: justify;\"><strong>Runtime Application Self-Protection<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#Sqreen<\/strong>: Sqreen is a Runtime Application Self-Protection (RASP) solution. The in-app agent instruments and monitors the app. Unauthorized user activities are reported and attacks are blocked without traffic redirection.<\/p>\n<p style=\"text-align: justify;\"><strong>Development<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#OAuth 2 in Action<\/strong>: Know how to use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server.<\/p>\n<p style=\"text-align: justify;\"><strong>#Securing DevOps<\/strong>:\u00a0 Know how the techniques of DevOps and Security should be applied together to make cloud services safer.<\/p>\n<p style=\"text-align: justify;\"><strong>#Secure by Design<\/strong>: Know about the design patterns and coding styles that make lots of security vulnerabilities less expected.<\/p>\n<p style=\"text-align: justify;\"><strong>#Understanding API Security<\/strong>: Know how the APIs are put together and how the OAuth protocol can be used to protect them.<\/p>\n<p style=\"text-align: justify;\"><strong>Usability<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#Usable Security Course<\/strong>: It is very useful for people who want to understand how security and usability converge.<\/p>\n<p style=\"text-align: justify;\"><strong>Big Data<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#data_hacking<\/strong>:\u00a0 Examples of using Pandas, Scikit, and IPython. Know how to bet on security data.<\/p>\n<p style=\"text-align: justify;\"><strong>#hadoop-pcap<\/strong>: Read about packet capture (PCAP) files from the Hadoop library.<\/p>\n<p style=\"text-align: justify;\"><strong>#Workbench<\/strong>: The python framework helps in security research and development teams.<\/p>\n<p style=\"text-align: justify;\"><strong>#OpenSOC<\/strong>: OpenSOC combines numerous open source big data technologies to offer a centralized tool for security monitoring.<\/p>\n<p style=\"text-align: justify;\"><strong>#Apache Metron<\/strong>: Apache Metron combines numerous open source big data technologies for security monitoring and analysis.<\/p>\n<p style=\"text-align: justify;\"><strong>#Apache Spot<\/strong>: The open source software aids in providing insights from flow and packet analysis.<\/p>\n<p style=\"text-align: justify;\"><strong>#binarypig<\/strong>: It is a scalable Binary Data Extraction in Hadoop.<\/p>\n<p style=\"text-align: justify;\"><strong>DevOps<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>#Securing DevOps<\/strong>:\u00a0 Know the Security techniques for DevOps that examines best practices used in securing\u00a0web applications and their infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Web Security also known as Cyber Security relates to the securing of websites and servers from online risks. It is aimed at safeguarding the sensitive data by restricting, discovering and responding to attacks. The\u00a0website security check\u00a0involves scanning for potential vulnerabilities and malware through website security software. A web security check informs the user of the online risks and advises solutions to address them. The first step to ensuring safety is by preventing and recognizing the risks. On the other hand, it is equally important in knowing the about Hacker, Hacking, Worms, Viruses, Trojans, Spyware, Adware, Rootkits, etc., which can attack\u2026<\/p>\n","protected":false},"author":3,"featured_media":118,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Web Security? - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Web Security? - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Web Security also known as Cyber Security relates to the securing of websites and servers from online risks. It is aimed at safeguarding the sensitive data by restricting, discovering and responding to attacks. The\u00a0website security check\u00a0involves scanning for potential vulnerabilities and malware through website security software. A web security check informs the user of the online risks and advises solutions to address them. The first step to ensuring safety is by preventing and recognizing the risks. On the other hand, it is equally important in knowing the about Hacker, Hacking, Worms, Viruses, Trojans, Spyware, Adware, Rootkits, etc., which can attack\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/hackermoz\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T23:11:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:44:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacked-750x400.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"What is Web Security?\",\"datePublished\":\"2019-03-08T23:11:58+00:00\",\"dateModified\":\"2020-05-30T23:44:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/\"},\"wordCount\":747,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacked-750x400.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/\",\"name\":\"What is Web Security? - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacked-750x400.jpg\",\"datePublished\":\"2019-03-08T23:11:58+00:00\",\"dateModified\":\"2020-05-30T23:44:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacked-750x400.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/hacked-750x400.jpg\",\"width\":750,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/what-is-web-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Web Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1777035926\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1777035926\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1777035926\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.com\",\"https:\\\/\\\/www.facebook.com\\\/hackermoz\\\/\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Web Security? - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/","og_locale":"en_US","og_type":"article","og_title":"What is Web Security? - MozDomains Blog","og_description":"Web Security also known as Cyber Security relates to the securing of websites and servers from online risks. It is aimed at safeguarding the sensitive data by restricting, discovering and responding to attacks. The\u00a0website security check\u00a0involves scanning for potential vulnerabilities and malware through website security software. A web security check informs the user of the online risks and advises solutions to address them. The first step to ensuring safety is by preventing and recognizing the risks. On the other hand, it is equally important in knowing the about Hacker, Hacking, Worms, Viruses, Trojans, Spyware, Adware, Rootkits, etc., which can attack\u2026","og_url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/","og_site_name":"MozDomains Blog","article_author":"https:\/\/www.facebook.com\/hackermoz\/","article_published_time":"2019-03-08T23:11:58+00:00","article_modified_time":"2020-05-30T23:44:00+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacked-750x400.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"What is Web Security?","datePublished":"2019-03-08T23:11:58+00:00","dateModified":"2020-05-30T23:44:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/"},"wordCount":747,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacked-750x400.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/","name":"What is Web Security? - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacked-750x400.jpg","datePublished":"2019-03-08T23:11:58+00:00","dateModified":"2020-05-30T23:44:00+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#primaryimage","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacked-750x400.jpg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/hacked-750x400.jpg","width":750,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/what-is-web-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is Web Security?"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website","url":"https:\/\/www.mozdomains.com\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.com\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1777035926","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1777035926","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1777035926","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.com","https:\/\/www.facebook.com\/hackermoz\/","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media\/118"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}