Back to main Click here:  
  Back to feature details Click here:  
 
  Community Builder - Example images  
 
     
    Learn more about Internet security: Learn how easy it is for hackers to crack that password you think is so secure or the techniques they use to break into online systems we recommend the following links on YouTube.
     
    CloudFlare Security Overview: Click here
     
    Defending against DDoS Attacks - Cloudflare: Click here
     
    How NOT to Store Passwords! - Computerphile: Click here
     
    Password Cracking - Computerphile: Click here
     
    How to Choose a Password - Computerphile: Click here
     
    Running an SQL Injection Attack - Computerphile: Click here
     
    Cookie Stealing - Computerphile: Click here
     
    Security is a huge concern with online systems and that's why we have spent an enormous amount of time building security protocols into Community Builder. We meeet and in almost every case exceed today's industry best security practices. Below is a list of a few of the security protocols we have implemented into Community Builder.

1. Server firewall: A firewall with all ports closed except those that are absolutely required to run the site is the only gateway to the actual web and database servers. This reduces the number of attack vectors to the servers themselves to the absolute minimum.

2. HTTPS: All sites are secured with an HTTPS certificate so data is encrypted from the user's browser to the web server and back to the user.

3. CloudFlare.com: The CloudFlare service (CloudFlare.com) is used to block inbound IP requests from sketchy country's like China, Russia, North Korea, etc.

4. DDOS: The CloudeFlare (CloudFlare.com) service also helps prevent Distributed Denial of Service attacks.

5. Strong Password: Passwords must be strong. They must be at least 8 chars with numbers, letters, and symbols.

6. Five Minute Lockout: After 5 failed login attempts the account is locked for 5 minutes preventing brute force attacks.

7. SHA512 password hashing: User passwords are NOT stored in the database. Only a SHA512 hash of the password is stored. To make it even more secure, before hashing the password a random salt of random length is added to the password in a random position before performing the SHA512 hash. Also the salt is not stored anywhere. This also means that if a user forgets their password they can only request a link to reset their password. Once a password reset is sent to their email they must click the link in the email which contains a unique key in the url. The site verifies the key is the same one sent to the user. Once the key is verified they must also answer one of the security questions they provided an answer for when they created their account. Only then can they reset their password.

8. SQL injection attacks: To thwart these types of attacks almost all interactions with the database are performed using stored procedures. This creates a separation between the actual SQL statement and the parameter values. This means a hacker can never breach the barrier of these two and confuse the computer into mixing the SQL code and the parameter values. For those few instances where dynamic SQL is used it is ALWAYS passed through a sanitizing routine that removes unnecessary SQL key words as well as characters that could indicated that malicious SQL or JavaScript code was injected.

9. XSS or Cross Site Scripting: To thwart Cross Site Scripting attacks (where a hacker attempts to get malicious JavaScript code to run on your system) all user input is html encoded which converts any JavaScript characters into the ASCII equivalent character strings which neutralizes the JavaScript from being able to run on the system.

10. RSA Encryption of sensitive data: Sensitive user data such as (first name, last name, email address, phone number, and address) are stored in the database as RSA encrypted data. So if a hacker ever breaches the server and somehow manages to steal the data all they will be able to see of the user's sensitive data is encrypted strings. The RSA encryption procedure uses a public and private key methodology. The public and private keys are stored in a separate database on a different machine so there is a separation of concerns of the two data stores.

11. No Cookie Policy: We love Cookie monster but he would likely starve on Community Builder because we have no cookies. To those who may be unaware cookies can represent a security threat in certain cases. Using XSS (cross site scripting attacks) hackers can steal your cookies and use them in a variety of malicious ways. Community Builder does NOT use cookies... at all...period! This thwarts any possible attack vectors that use cookies since there are none to steal...at all...period!

12. Two Factor Authentication: Two factor login authentication using Google Authenticator will be available soon.