A Review of the Vulnerabilities of Web Applications?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 9)Publication Date: 2013-09-30
Authors : Ravneet Kaur Sidhu;
Page : 302-309
Keywords : Misconfiguration; Indexing; Anti-automation; Validation; Expiration; Authentication;
Abstract
Insecure software is undermining our financial, healthcare, defense, energy, and other infrastructure. As our digital infrastructure gets increasingly complex and interconnected the difficulty of achieving application security increases exponentially. An attacker can target and compromise a database server in a number of ways by exploiting a variety of configurations and application level vulnerabilities. In this paper we discuss some attacks and weaknesses that can result in the compromise of a web application or its user.
Other Latest Articles
- COLLECTING MAIZE LANDRACES IN ALBANIA
- REDUCTION OF ENERGY AND WATER CONSUMPTION IN SOFT DRINKS PRODUCTION, AS A RESULT OF IMPLEMENTATION OF THE CLEANER PRODUCTION PRINCIPLES
- EFFECT OF TEMPERATURE AND DISSOLVED OXYGEN CONCENTRATIONS ON THE NITRITATION IN A SUBMERGED BIOFILTER
- BIOLOGICAL AMMONIUM REMOVAL VIA NITRITE PATHWAY
- STUDY ON SOME AREAS OF RARE PLANTS SPECIES FROM THE MIDDLE SECTOR OF NISTRU RIVER BASIN (THE REPUBLIC OF MOLDOVA)
Last modified: 2013-12-03 15:37:05