logo

Application Security Assignment 2022

   

Added on  2022-10-06

8 Pages2324 Words9 Views
 | 
 | 
 | 
Running Head: APPLICATION SECURITY
Course Title:
Course Code:
Assignment title: Application Security
Name of the paper reporting: Evaluation of Web Application Security Risks and Secure Design
Patterns
Authors: Asish Kumar Dalai and Sanjay Kumar Jena
Student Name:
Student ID Number:
Instructors Name:
Institutional Affiliation:
Date:
Student Name:
Student ID:
Application Security Assignment 2022_1

APPLICATION SECURITY
APPLICATION SECURITY
ABSTRACT
Applying of security in development regarding the development of the web is usually one of the
critical factors to business individuals and other innovators based on the extensive use of the
website based on different business setups and other innovative fields [2]. Most of the attacks
encountered in the web applications are as a result of the failure by the developers of that
particular web to consider security as a significant factor of concern. In some other cases, the
attacks are as a result of security flaws encountered when designing and developing that
particular application [5]. These flaws have, in most cases, served as a way out or a channel
through which attackers can quickly attack the business though dubious methods of access into
its system [4]. Enforcement of high standard security in the development of particular software
in its life cycle may help to reduce the high cost. Also, there are efforts associated with the entire
process of implementing this kind of security features at the late stage of the entire process.
Therefore, with consideration of the attacks, several attempts have been made to define several
security patterns [1]. In this paper, various existing security patterns have been analyzed with
proper classification of the application vulnerabilities as well as doing a proper pairing or proper
relation between each vulnerability and its appropriate or suitable feature [3]
INTRODUCTION
Various developers have chosen the web to be their prime choice to design and deploy various
applications due to the cross-platform compatibility in it. In this paper, authors have taken into
consideration several advancements that web application has undergone with the minimal or the
lowest possible technologies [14]. An example being the web services and ajax. There is also an
alarming increase in the number of attacks to web applications with an increase in technological
advancements. Therefore, traditional approaches regarding the software development life cycle
may not be suitable at all in incidences where security in the web application is an excellent
factor of consideration [13]. This means that, writing of a secure code or testing an already
existing system so as to prove its uniqueness and strength in which hackers cannot easily access
it is of great importance since it improves the security of the data kept in that business set up and
Student Name:
Student ID:
2
Application Security Assignment 2022_2

APPLICATION SECURITY
all the files are inaccessible from all the hackers. Additionally, making appropriate utilization of
all the security design for a particular context may significantly reduce all the chances that
attackers could have to access the data system of that business [11]. There are a significant
number of attempts that have been made to come up with the appropriate and elaborate
explanation of some features that are contained in the security patterns. These explanations can
be used by software developers to come up with a proper function that can make a specific
software complex and harder to be accessed by any unauthorized persons. This may be of great
importance in web development, but making an appropriate choice for this matter becomes a bit
challenging [6]
The primary purpose of this report is to highlight various development features that have taken
place in application development to ensure they are more secure from the attackers and
unauthorized access. In this particular paper, various works relating to security patterns have
been tackled in detail and adequately studied with an appropriate characterization of
vulnerabilities that can quickly arise from the entire process of web development and
management with various attempts of providing a suitable pattern that can be used to resolve
each vulnerability [15]. This acted as a beginning for various researches that can be carried out in
the future regarding the entire process of security patterns in the development of the web.
Additionally, this paper provided a direction and framework of what future innovators and
software developers need to address and expect when handling this kind of work. In this paper,
the process of origin and the growth of design patterns regarding the web development process
has been adequately elaborated. Also, security patterns that represent the related works have
been discussed while appropriately highlighting some of the familiar sources of vulnerabilities
with their appropriate classification and lastly a proper conclusion regarding all the finding in the
paper [10].
INTENTIONS OF THE PAPER
Design patterns
Student Name:
Student ID:
3
Application Security Assignment 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents