Secure Development - Web Application Security.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 6
Abstract
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to attacks such as SQL injection and cross-site scripting. This paper also list out the different categories of vulnerability with the small examples along with prevention guidance and a sample of research by different vendors about the State of Software Security Report and Web Application Vulnerability Statistics of 2012. This paper reviews need of secure development, resource s available for creating secure Web applications. These resources ranges from the security features of the development, to automated tools evaluating an existing Web application, to Web sites dedicated to all facets of Web application security. In Web application security, making one single mistake can lead to many unwanted flaws. By using the different resources available, the risk of the applications to be vulnerable can be reduced to an acceptable level. In addition, some risk can be avoided at the very beginning of the project life cycle when the requirements for the system are defined.
Authors and Affiliations
Sayyad Arif Ulla
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch &nbs...
Image Noise Removal by Dual Threshold Median Filter for RVIN
Abstract: Removal of random valued impulse noise in digital images with edge preservation is one of thechallenging tasks in digital image processing. For removal of impulse noise as well as preserve edge proposeda...
Penetration Testing for Android Smartphones
One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems ha...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security Issues
Technical solutions, introduced by policies and implantations are essential requirements of an information security program. Advanced technologies such as intrusion detection and prevention system (IDPS) an...
Analyzing and Surveying Trust In Cloud ComputingEnvironment
Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticityand flexibility in using the computing resources and services to fulfill the requirement of current business...