logo

Author's note: "Web APPLICATION SECURITY ASSESSMENT 2 2 WEB APPLICATION SECURITY ASSESSMENT Name of student Name of university"

   

Added on  2022-08-12

18 Pages4249 Words15 Views
Running head: WEB APPLICATION SECURITY ASSESSMENT
WEB APPLICATION SECURITY ASSESSMENT
Name of student
Name of university
Author’s note:

1
WEB APPLICATION SECURITY ASSESSMENT
Abstract
In modern world computation, the customers need improved services and improved products.
For providing the customers with their desired products and the services, the companies are
implementing the innovative technologies that could be helpful in the organisation. The
introduction of various innovative technologies helps the companies to provide improved
products and services but it also introduces various kinds of threats in the organisation that
could be executed by any malicious attacker.

2
WEB APPLICATION SECURITY ASSESSMENT
Table of Contents
Introduction....................................................................................................................3
Discussion......................................................................................................................3
Risks...........................................................................................................................3
Threats........................................................................................................................4
Vulnerabilities............................................................................................................5
Conclusion......................................................................................................................6
Introduction....................................................................................................................9
Discussion......................................................................................................................9
Mitigating the risks....................................................................................................9
Mitigating the threats...............................................................................................10
Mitigating the vulnerabilities...................................................................................11
Conclusion....................................................................................................................12
References....................................................................................................................13

3
WEB APPLICATION SECURITY ASSESSMENT
Introduction
The introduction of various kinds of web application has helped the companies in
simplifying the methods by which the products and services are provided to the customers but
it has also increased the risks of data theft and various kinds of attacks that could breach the
data of the organisation. The haboob company allows their customers to buy the products as
well as the services from the website but it has been observed that the customers are not
following the proper security protocols while using the web application. This report intends
to analyse the threats, risks and the vulnerabilities that might be found on the web application
and lead to the serious damage to the organization.
Discussion
Risks
Injection attacks: The injection attacks mainly denote to the broad class of the attack
vendors. In any injection attack, an attacker mainly provides the untrusted input to any
program. The process of the input is done by any interpreter as the section of the command or
any query. In return, it alters the main execution of the program (Liang et al., 2016). The risk
of the injection attacks are considered to be the most dangerous kind of attack that is aimed at
the web application. It leads to the theft of data, loss of data, and the damage of extensive
integrity of data, the denial of services and the compromising of the complete system of the
company (Liang et al., 2016).
Cross-site scripting: Cross-site scripting could be described as the injection attack
that is caused on the client-side (Gupta & Gupta, 2017). Within this type of attack, the main
intention of the attackers is executing various malicious scripts on the web browsers of the
targeted victim. The attack is executed by adding the malicious code in the authentic web
application or any particular web browser. As soon as the targeted user visits the web page,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
190 - web developmet
|4
|395
|232

Cyber Security: Motives of Web Application Attacks and Types of Vulnerabilities
|8
|1561
|362

Ways of Attacking a Web Application in PHP: SQL Injection, XSS, Session Hijacking, Directory Traversal, and Remote File Inclusion
|9
|1493
|176

Contemporary World Application 2022
|10
|541
|10

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Software Security Assignment
|5
|999
|61