logo

Contemporary World Application 2022

This assignment requires students to do a 5-10 minute presentation on a recent academic paper related to IT Security.

10 Pages541 Words10 Views
   

Added on  2022-10-06

Contemporary World Application 2022

This assignment requires students to do a 5-10 minute presentation on a recent academic paper related to IT Security.

   Added on 2022-10-06

ShareRelated Documents
Introduction
Application security has become a concern in
the contemporary world which is advance in
terms of technology. Web applications are
difficult to secure because they are exposed
to the public, including malicious users. Also,
since the input f Web applications come from
HTTP requests, improper input validation
results to security vulnerabilities. Web
Application security helps in reducing the
vulnerabilities in the Web application to
enhance security.
Contemporary World Application 2022_1
Web Application Anatomy
Understanding the anatomy of Web
applications is essential in
developing security of these
applications. According to Web
Application Security Consortium, a
web app is a software application
executed by a web server that
responds to dynamic web page
requests over HTTP.
Contemporary World Application 2022_2
Origin of Web Application
VulnerabilityOrigin of Web Application
Vulnerability
Web applications interacts with the
users through the form elements
such as texts and the POST or GET
variables. Most of the critical
vulnerabilities are caused by
improper processing of data items
within HTTP. The threats to the
database server layer include
password cracking attacks,
unauthorized server access and SQL
Contemporary World Application 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
GNS3 Simulation - Networking
|9
|565
|52

Computing Technologies Assignment Report
|7
|1221
|30

Software Security Assignment
|5
|999
|61

Cyber Defence For Business Analysis Report
|11
|1814
|11

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Ways of Attacking a Web Application in PHP: SQL Injection, XSS, Session Hijacking, Directory Traversal, and Remote File Inclusion
|9
|1493
|176