Professional Development Committee, Spring Technology Workshop
The Elements of Creating a Web PageHomePreviousNext



Whole site design

Page design

Color and Graphics


  • Web site setup
  • Tools
  • Security
  • Testing
  • Maintenance
  • User logs



    Site map

  • Implementation -- Security
    Will your Web site contain confidential documents? If yes, some form of access control will be necessary to insure such documents are served only to authorized users.

    Three types of access restriction
    1. Restriction by IP address, subnet, or domain
      Individual documents or whole directories are protected in such a way that only browsers connecting from certain IP (Internet) addresses, IP subnets, or domains can access them.
    2. Restriction by user name and password
      Documents or directories are protected so that the remote user has to provide a name and password in order to get access.
    3. Encryption using public key cryptography
      Both the request for the document and the document itself are encrypted in such a way that the text cannot be read by anyone but the intended recipient. Public key cryptography can also be used for reliable user verification. See below.

    The World Wide Web Security FAQ

    Comments? Contact:
    Julie Wetherill
    Copyright 1997, Harvard University. All rights reserved. Revised March 1998TopPreviousNext