Secure Development - Web Application Security.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 6
Abstract
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to attacks such as SQL injection and cross-site scripting. This paper also list out the different categories of vulnerability with the small examples along with prevention guidance and a sample of research by different vendors about the State of Software Security Report and Web Application Vulnerability Statistics of 2012. This paper reviews need of secure development, resource s available for creating secure Web applications. These resources ranges from the security features of the development, to automated tools evaluating an existing Web application, to Web sites dedicated to all facets of Web application security. In Web application security, making one single mistake can lead to many unwanted flaws. By using the different resources available, the risk of the applications to be vulnerable can be reduced to an acceptable level. In addition, some risk can be avoided at the very beginning of the project life cycle when the requirements for the system are defined.
Authors and Affiliations
Sayyad Arif Ulla
Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm
Abstract : Cloud Computing provides scalable services which can be used by user on a need basis. These services can be accessed through the internet. User stores important data (mainly, financial and health data) o...
Efficient design of feedforward network for pattern classification
A feedforward neural network is a computing device whose processing units (the nodes) are distributed in adjacent layers connected through unidirectional links (the weights).Feedforward networks are widely used...
A Review on Solving ECDLP over Large Finite Field Using Parallel Pollard’s Rho (ρ) Method
Abstract: Elliptic Curve Discrete Log Problem (ECDLP) is the underlying basis of many popular Public Key Scheme like Diffie-Hellman and ElGamal. The strength of such public key schemes is based on the difficulty ofsolvin...
Comparative Performance Analysis of SALT and PEPPER Noise Removal
Abstract: Noise is an important factor which when get added to an image reduces its quality and appearance.So in order to enhance the image qualities, it has to be removed with preserving the textural information a...
Performance Analysis of Sdrp for Wsn Using Diffie – Hellman Algorithm
Abstract: Wireless Sensor Network is a group of wireless nodes exclusively designed for the continuous sensing of information at human inaccessible locates. Reprogramming is a definite need at such situations when...