An OWASP Top Ten Driven Survey on Web Application Protection Methods

نویسندگان

چکیده

Web applications (WAs) are constantly evolving and deployed at broad scale. However, they exposed to a variety of attacks. The biggest challenge facing organizations is how develop WA that fulfills their requirements with respect sensitive data exchange, E-commerce, secure workflows. This paper identifies the most critical web vulnerabilities according OWASP Top Ten, corresponding attacks, countermeasures. application these countermeasures will guarantee protection WAs against severe attacks prevent several unknown exploits.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a Secure Web Application Using OWASP Guidelines

Developing a secure Web application is very difficult task. Therefore developers need a guideline to help them to develop a secure Web application. Guideline can be used as a checklist for developer to achieve minimum standard of secure Web application. This study evaluates how good is OWASP guideline in helping developer to build secure Web application. The developed system is then tested usin...

متن کامل

Web Survey Methods Introduction

A key characteristic of Web surveys is their diversity. Unlike other modes of data collection, where the method tells us something about both the sampling process and the method of data collection, the term “Web survey” is too broad to give us much useful information about how the study was carried out. For example, referring to an RDD telephone survey describes both the method of sampling (in ...

متن کامل

A Survey on Web Application Security

Web applications are one of the most prevalent platforms for information and services delivery over Internet today. As they are increasingly used for critical services, web applications become a popular and valuable target for security attacks. Although a large body of techniques have been developed to fortify web applications and and mitigate the attacks toward web applications, there is littl...

متن کامل

A survey on protection and restoration methods in Optical Networks

optical networks working on WDM (Wavelength Division Multiplexing) are prone to component failures. As these networks carry huge amount of information, fault management has become vital in maintaining survivability of high speed optical networks. In WDM networks failure of networks, failure of network element may cause the failure of several optical channels, thereby leading to large data losse...

متن کامل

Visual privacy protection methods: A survey

Recent advances in computer vision technologies have made possible the development of intelligent monitoring systems for video surveillance and ambientassisted living. By using this technology, these systems are able to automatically interpret visual data from the environment and perform tasks that would have been unthinkable years ago. These achievements represent a radical improvement but the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-68887-5_14