HomeSEO TheoryBlogContact

Website Security for SEO

Site security is a major concern for anyone using the web, whether for privacy protection, safety or virus prevention. Fortunately, there any analytical ways of assessing a site's security levels and those metrics can be used for ranking purposes. In this article, we'll break down the components of site security and identify common weaknesses and security standards in an ever changing digital world. Once we have an understanding of how security works and how important it is to the users, we can implement a ranking functions based on common site security standards.

Page Content
Metadata and Page Details
Metadata and Page Details
Creator: Devin Peterson
Date: Created 05/28/2014
Subject: Web Security Standards, Privacy Protection, Malware and Spyware, SEO
Publisher: DNM Int'l
Contributors:
Peer Review:
Resources:
Citation: Peterson, D. (2014), "Website Security for SEO", Retrieved , from http://seowrit.com/website-security

Why Web Security is Important

No matter how advanced web security standards become, there may always be a way for hackers and thieves to penetrate important and valuable information within a website's database. This could mean thousands or even millions of people losing sensitive information to people who are willing to abuse and exploit that data. It is therefore no question that a website which implements better security standards is of greater value to the user, to themselves, and to the internet community.

Although a detailed analysis of web security may require a vast technical understanding of computer science, the basic concepts can be generalized and understood for the purposes of SEO implementation.

Components of Security

SSL Certificate Authentication

SSL (Secure Socket Layer) Certificates are one of the first steps to securing a website, especially when private information is entered by a user, such as personal information and credit card numbers. The lack of a verifiable SSL on web pages containing input boxes may results in a red flag.

Server Keys

Use cryptographic keys to send data from server to computer. This is usually standard practice.

Number of Certificates

Having more than one certificate is better than none, but there is a point of diminishing return. Some certs serve different purposes so look into what you need an SSL for and then find the 2 most reputable companies that offer it.

Certification Paths

SSL Configuration

Protocols
Cipher Suites
Handshake Simulations
Protocol Details

SSL Deployment Practices

The Security Ranking Function

Best Practices and White Hat Tips

What to Avoid - Black Hat Tactics

Common Questions About Site Security