slugIs your website protected: a quick study to know “unknown doors to your websites?”
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 2
Abstract
Website and its related technology started to play a vital role in our life. Infect it has become most important representative of business and provide significant improvements in business operations, banking system, education system, communication system and in the entire human life. Websites has not only brought the world closer together, but it has allowed the world's to access any part of the world in easiest way. It’s provide a smooth and easiest platform through which our prospective client or customer also interacts with our business and huge number of sales happen through this only. But good and bad things always fly together. Same is with websites also. Developers always try to develop best websites and hackers try to destroy it or damage vital information. So, there is a need of extraordinary attention towards protection of websites, especially if we are transferring vital information through it. There is lot of loopholes or we can say that unknown doors by which hackers try to enter in websites and try to damage it. Such as SQL injection, cross site scripting, session management, click jacking, dns caching, symbolic linking etc. So, through this article we want to describe some loopholes by which hackers try to enter in any websites or hacked it. Hence we suggest all website owner to take almost care for making their website as secured as possible. Always tries to secure your database, validate all inputs, encrypt all user name and passwords, end sessions properly and close all possible doors to keep hackers out.
Authors and Affiliations
Seema Agarwal, Manjeet Singh, Navneet Kumar
A Clustering Based Efficient Intrusion Detecting In Multitier Dynamic Web Applications
We present DoubleGuard, a system used to detect attacks in multitiered web services and classify through Hierarchal clustering Algorithm. Our approach can create normality models of isolated user sessions that include b...
Finite Element Analysis of Multi-Layered Corrugated Panels under Crushing Loading – A Review
The multi-layered corrugated panels have light weight and higher performances as it has high strength to weight ratio. The sandwich panels are made up of trapezoidal aluminum cores and aluminum alloy sheets. The differe...
Energy Efficient Clustered Routing Protocols of LEACH
Sensor node has a limited amount of battery in sensor network. To prolong the overall lifetime of the network, development of energy efficient routing protocol is a major issue in Wireless Sensor Network. Clustering pro...
Metal Defect Detection Using Random Threshold and Wiener Filter
Quality of all substances like metals and other materials needs to be verified in advance for industrial use. Traditional system to defect and deficiency detection uses only grey level method to classify defects but due...
Mems Based Hand Gesture Recognition of Physically Disabled People
Now days it is very complicated to monitor patients health every hour. This is very helpful and useful for monitoring more number of people at a time. It was very low cost and effective. In this project microcontroller...