Risks and Threats to Web Applications and Their Preventions : A Theoretical Study on Vital Risks and Threats
DOI:
https://doi.org/10.32628/CSEIT217281Keywords:
Web Application, Web Application Security, Vulnerabilities, Risks, Threats, Cyber Security.Abstract
With the rapid evolution of technology, almost every business is now online connecting them to the widest and narrow corners of the world. Therefore, instead of physical security, their online security is a pivotal concern the business which all depends on the web applications security. Web application attacks and their risks have become normal since past many years, and the security of web applications has received increased attentions at present. Many attacks work on real time and mostly prevention mechanisms focus on prevention and detection of these attacks on the web applications. This research focuses on giving attention to the top 10 threats that organizations need to know and to ensure the web applications are protected from these risks and attacks.
References
- Clincy, V., & Shahriar, H. (2018). Web Application Firewall: Network Security Models and Configuration. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). doi:10.1109/compsac.2018.00144
- DivyaniYadav, Gupta, D., Singh, D., Kumar, D., & Sharma, U. (2018). Vulnerabilities and Security of Web Applications. 2018 4th International Conference on Computing Communication and Automation (ICCCA). doi:10.1109/ccaa.2018.8777558
- Ma, L., Zhao, D., Gao, Y., & Zhao, C. (2019). Research on SQL Injection Attack and Prevention Technology Based on Web. 2019 International Conference on Computer Network, Electronic and Automation (ICCNEA). doi:10.1109/iccnea.2019.00042
- You Yu, Yuanyuan Yang, Jian Gu, and Liang Shen Ministry of Public Security Quality Supervision and Testing Center of Security Products for Computer Information System the Third Research Institute of Ministry of Public Security Shanghai, China yuy@mctc.gov.cn
- why Insufficient Logging and Monitoring Can Help Attackers ..., https://apiacademy.co/2020/04/why-insufficient-logging-and-monitoring-can-help-attackers-hide-in-plain-sight/.
- Application Security | goPayroll.net, https://gopayroll.net/security/.
- How to detect Cross Site Scripting Issues (XXS ..., https://www.omnicybersecurity.com/how-to-detect-cross-site-scripting-issues-xxs/.
- https://www.webarxsecurity.com/website-hacking-statistics-2018-february/
- https://www.varonis.com/blog/cybersecurity-statistics/
- https://www.webarxsecurity.com/website-hacking-statistics-2018-february/
- https://www.infosecurity-magazine.com/news/cyberattacks-up-37-over-past-month/
- https://news.netcraft.com/archives/category/web-server-survey/
- https://owasp.org/www-project-top-ten
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.