Implement web-based and server security features.
Implementation should include utilizing web-based and server security features to control access to an Internet server by
- employing password authentication schemes
- restricting or permitting access at the IP address level
- managing server access keys
- disabling folder browsing
- patching software and OS
- testing systems for vulnerabilities.