slugIs your website protected: a quick study to know “unknown doors to your websites?”

Abstract

Website and its related technology started to play a vital role in our life. Infect it has become most important representative of business and provide significant improvements in business operations, banking system, education system, communication system and in the entire human life. Websites has not only brought the world closer together, but it has allowed the world's to access any part of the world in easiest way. It’s provide a smooth and easiest platform through which our prospective client or customer also interacts with our business and huge number of sales happen through this only. But good and bad things always fly together. Same is with websites also. Developers always try to develop best websites and hackers try to destroy it or damage vital information. So, there is a need of extraordinary attention towards protection of websites, especially if we are transferring vital information through it. There is lot of loopholes or we can say that unknown doors by which hackers try to enter in websites and try to damage it. Such as SQL injection, cross site scripting, session management, click jacking, dns caching, symbolic linking etc. So, through this article we want to describe some loopholes by which hackers try to enter in any websites or hacked it. Hence we suggest all website owner to take almost care for making their website as secured as possible. Always tries to secure your database, validate all inputs, encrypt all user name and passwords, end sessions properly and close all possible doors to keep hackers out.

Authors and Affiliations

Seema Agarwal, Manjeet Singh, Navneet Kumar

Keywords

Related Articles

A Clustering Based Efficient Intrusion Detecting In Multitier Dynamic Web Applications

We present DoubleGuard, a system used to detect attacks in multitiered web services and classify through Hierarchal clustering Algorithm. Our approach can create normality models of isolated user sessions that include b...

Finite Element Analysis of Multi-Layered Corrugated Panels under Crushing Loading – A Review

The multi-layered corrugated panels have light weight and higher performances as it has high strength to weight ratio. The sandwich panels are made up of trapezoidal aluminum cores and aluminum alloy sheets. The differe...

Energy Efficient Clustered Routing Protocols of LEACH

Sensor node has a limited amount of battery in sensor network. To prolong the overall lifetime of the network, development of energy efficient routing protocol is a major issue in Wireless Sensor Network. Clustering pro...

Metal Defect Detection Using Random Threshold and Wiener Filter

Quality of all substances like metals and other materials needs to be verified in advance for industrial use. Traditional system to defect and deficiency detection uses only grey level method to classify defects but due...

Mems Based Hand Gesture Recognition of Physically Disabled People

Now days it is very complicated to monitor patients health every hour. This is very helpful and useful for monitoring more number of people at a time. It was very low cost and effective. In this project microcontroller...

Download PDF file
  • EP ID EP17757
  • DOI -
  • Views 371
  • Downloads 12

How To Cite

Seema Agarwal, Manjeet Singh, Navneet Kumar (2014). slugIs your website protected: a quick study to know “unknown doors to your websites?”. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(2), -. https://europub.co.uk/articles/-A-17757