The Security Vulnerabilities in Websites the Security

Authors

  • Muthanna Ibrahim Neamah History Department, College of Art, Al Iraqia University, Iraq Author

DOI:

https://doi.org/10.61841/j57xkm23

Keywords:

Security Systems, Vulnerabilities, Web Applications, Software Development, Malware Detections

Abstract

Nowadays, internet usage growth is rapidly increasing day by day with respect to technological aspects. To add a brief description to this, as of late web security has been seen with regard to anchoring the web application layer from assaults by unapproved clients. The vulnerabilities existing in the web application layer have been ascribed either to utilizing an unseemly programming improvement model to manage the advancement procedure or to the utilization of a product improvement show that does not think about security as a key factor. Along these lines, this orderly writing survey is directed to examine the different security vulnerabilities used to anchor the web application layer, the security methodologies or strategies utilized all the while, the phases in the product improvement in which the methodologies or procedures are underscored, and the apparatuses and components used to distinguish vulnerabilities. This article might help the data users to abstain from those arrogations. 

Downloads

Download data is not yet available.

References

[1] J. Pescatore, Web Services: Application-Level Firewalls Required, report no. SPA-15-5542, Gartner, Stamford, Conn, 7 Mar. 2002; available at www4.garter.com/DisplayDocument?id=353429 web accessed on 29 January 2019

[2] Xiaowei Li and Yuan Xue, “A Survey on Web Application Security,” technical report, Vanderbilt University, 2011.

[3] Z. Su and G. Wassermann. The essence of command injection attacks in Web applications. In Proc. POPL, 2006.

[4] Kumar, G. N. S., and A. Srinath. 2018. "An Ergonomical Condition of Pedestrians on Accelerating Moving Walkway: A People Mover System." International Journal of Mechanical and Production Engineering

Research and Development 8 (Special Issue 7): 1376-1381.

[5] Mohit Kumar, Abhishek Gupta, Azhar Shadab, Lokesh Kumar & Vikas Kumar Tiwari, Defending Against

Modern Threats in Web Applications, International Journal of Computer Science and Informatics ISSN

(PRINT): 2231–5292, Vol-1, Iss-4, 2012.

[6] Fielding, R., Gettys, J., Migul, J., Freystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol {HTTP/1.1.RFC 2616, http://www/w3/prg/Protocols/rfc2616/rfc2616.html (June 1999).

[7] Berners-Lee, T., Fielding, R., Irvine, U., Masinter, L.: Uniform Resource Identifiers (URI): Generic Syntax. RFC 2396, http://www.ietf.org/rfc/rfc2396.txt (August 1998).

[8] Kumar, Gurram Narendra Santosh and A. Srinath. "Exploration of Accelerating Moving Walkway for Futuristic Transport System in Congested and Traffical Areas." (2018): 616-624.

[9] Mallik, K.S.K., Kumar, G.N.S., Balasubramanyam, S., Swetha, D. A review on preparation and structural

characterization studies of graphitic carbon nitride (2017) Journal of Advanced Research in Dynamical and

Control Systems, 9 (Special Issue 14), pp. 1869-1880

[10] Rama Chandra Manohar, K., S. Upendar, V. Durgesh, B. Sandeep, K. S. K. Mallik, G. N. S. Kumar, and S. H.

Ahammad. 2018. "Modeling and Analysis of Kaplan Turbine Blade using CFD." International Journal of

Engineering and Technology (UAE) 7 (3.12 Special Issue 12): 1086-1089.

[11] A. Barth, J. Caballero, and D. Song, “Secure content sniffing for web browsers, or how to stop papers from

reviewing themselves,” Conference: 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May

2009, Oakland, California, USA, DOI: 10.1109/SP.2009.3 ·

[12] Malware Info Resource Center, http://www.malwareinfo.com/mal_faq_inject.html web accessed on January

31, 2019

[13] [13] Google Security Blog,

http://googleonlinesecurity.blogspot.com/2009/08/malwarestatistics-update.html web accessed on February

1, 2019

[14] http://www.forbes.com/sites/andygreenberg/2011/08/05/androidapp-turns-smartphones-into-mobile-hacking-machines/ web accessed on February 3, 2019

[15] Balasubramanyam, S., D. Padmaja Usharani, A. Harsha Vardhan Reddy, Danthala Swetha, Gurram Narendra Santosh Kumar, K. Anusha, and Sk Hasane Ahammad. “Selecting a College Academic Branch-a Design Decision-Taking System for Student Career Selection.” International Journal of Engineering Technology 7, no. 4.19 (2018): 323-328.

Downloads

Published

31.07.2020

How to Cite

Ibrahim Neamah, M. (2020). The Security Vulnerabilities in Websites the Security. International Journal of Psychosocial Rehabilitation, 24(5), 4319-4324. https://doi.org/10.61841/j57xkm23