Analysis of Cybercrime Threats and Secure Web Server Implementation

Verified

Added on  2022/11/13

|6
|730
|219
Report
AI Summary
This report provides a comprehensive introduction to secure web servers, addressing the critical issue of cybercrime in today's e-commerce landscape. It details various attack types, including SQL injection and Denial of Service (DDoS) attacks, and emphasizes the importance of implementing Software Development Life Cycle (SDLC) security measures to mitigate risks. The report explores network protection strategies, such as encrypted routers and anti-malware software, as well as application security verification and protection against vulnerabilities like XSS attacks. Furthermore, the report highlights the significance of designing applications to handle data from untrusted sources securely. References to relevant research papers are also included to support the analysis and recommendations presented in this report.
Document Page
Secure Web Server
IntroductionCybercrime is one of the biggest threats to the Internet in
today's e-commerce. Due to advances in technology, attackers
access the Internet and computer systems used to commit
offenses by accessing critical business data.
The occurrences of cyber-attacks result in excessive damage to
the business, especially for intellectual property rights,
resulting in a loss of competitive advantage. The sales
company where I work uses a web server to access a
customer's web application for retail purchases through a
customer with an Internet license.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Attacks
on Web
servers.
A malicious attacker uses many techniques to
exchange Internet servers. Every website running on
an Internet server has the ability, through
encryption, to exchange the server types of attacks
and web carriers are revealed every day.
Types of Attacks
The SQ injection connection involves modifying the
database to extract or add records. SQ is the most
widely identified database language used in
conjunction with Internet servers
Denial of Service (DDoS) attacks are the most
widely identified techniques for submerging a
website. It is an episode in which a consumer or an
association has refused administrations a good that
they often wanted to have.
Document Page
Software development life-cycle security measures
To improve the effectiveness of security features, a
company wants to know where to use security features
with software development life cycle to take control of
capacity threats. In a business, the SDLC can be
integrated with all sensitive departments, as well as
finance, registration and management.
Document Page
Security
applicatio
ns
Network protection also plays a huge
role in protecting the Internet server.
Consequently, a company can install an
encrypted internet router to improve the
security of the firm or use anti-malware
software for networking.
Security of The Application Verification
The security of the audit application
involves an organized assessment of the
enterprise protection system to
determine if it conforms to the
configuration standards
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security applications
protection
Given weaknesses such as SQ injection
and attack against URL interpretation, a
company can protect its application from
this threat by taking action, regularly
updating firewalls and advising developers
on established security features in the
software before configuration.
To avoid XSS attacks and attacks, an
application must be designed to accept all
the information, be it a structure, a URL, a
processing or even the database software.
an untrustworthy source.
Document Page
References
Alomari, E., Manickam, S., Gupta, B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based
distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv
preprint arXiv:1208.0403.
Gaikar, V. (2013). Protecting Business Websites: Advantages of SSL Certificates.
Mittal, P., & Jena, S. K. (2013). A fast and secure way to prevent SQL injection attacks. Paper
presented at the 2013 IEEE Conference on Information & Communication Technologies.
Abrahamsson, P., Salo, O., Ronkainen, J., & Warsta, J. (2017). Agile software development
methods: Review and analysis. arXiv preprint arXiv:1709.08439.
Alomari, E., Manickam, S., Gupta, B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based
distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv
preprint arXiv:1208.0403.
Gaikar, V. (2013). Protecting Business Websites: Advantages of SSL Certificates.
Mittal, P., & Jena, S. K. (2013). A fast and secure way to prevent SQL injection attacks. Paper
presented at the 2013 IEEE Conference on Information & Communication Technologies.
Moebius, N., Stenzel, K., & Reif, W. (2010). Formal verification of application-specific security
properties in a model-driven approach. Paper presented at the International Symposium on
Engineering Secure Software and Systems.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]