Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analysis of vulnerabilities and security problems of web applications

View through CrossRef
The article provides a comprehensive analysis of vulnerabilities, methods, tools and problems faced by web application security testing. The analysis of scientific research in the field of web application security testing revealed a significant interest of scientists in finding effective ways to minimize site security risks and vulnerabilities. It was found out that the list of the most common web application vulnerabilities includes: broken access control, cryptographic failures, misconfiguration of security, SQL and other injections, insecure design, identification and authentication errors, etc. Specific features of the security vulnerabilities of web applications are highlighted. The problems faced by automated tools for web security testing are separately considered, namely the development of automated tools for web security testing, the use of RIA (Rich Internet Application) web applications, and the use of insecure cryptographic storage. Web application security risks can be associated with the design phase, the development phase, the deployment phase, and the maintenance phase. It is security testing that is used to identify these risks of the web application, to investigate the vulnerabilities and weak points of the web application. The conducted analysis of security vulnerabilities, methods and problems of testing web applications revealed the presence of different approaches to protect software products. A combination of manual and automated web application security testing techniques is advisable, starting with automated security testing and complementing it with manual penetration testing. A comprehensive approach should integrate testing into all stages of the software development life cycle. Such approach helps to use the most appropriate and effective available methods for the current phase of software product development.
Title: Analysis of vulnerabilities and security problems of web applications
Description:
The article provides a comprehensive analysis of vulnerabilities, methods, tools and problems faced by web application security testing.
The analysis of scientific research in the field of web application security testing revealed a significant interest of scientists in finding effective ways to minimize site security risks and vulnerabilities.
It was found out that the list of the most common web application vulnerabilities includes: broken access control, cryptographic failures, misconfiguration of security, SQL and other injections, insecure design, identification and authentication errors, etc.
Specific features of the security vulnerabilities of web applications are highlighted.
The problems faced by automated tools for web security testing are separately considered, namely the development of automated tools for web security testing, the use of RIA (Rich Internet Application) web applications, and the use of insecure cryptographic storage.
Web application security risks can be associated with the design phase, the development phase, the deployment phase, and the maintenance phase.
It is security testing that is used to identify these risks of the web application, to investigate the vulnerabilities and weak points of the web application.
The conducted analysis of security vulnerabilities, methods and problems of testing web applications revealed the presence of different approaches to protect software products.
A combination of manual and automated web application security testing techniques is advisable, starting with automated security testing and complementing it with manual penetration testing.
A comprehensive approach should integrate testing into all stages of the software development life cycle.
Such approach helps to use the most appropriate and effective available methods for the current phase of software product development.

Related Results

Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia
Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia
Most of Malaysia’s small entrepreneurs have switched to online platforms as an alternative to their physical businesses. Social media sites such as TikTok, Instagram, Twitter, and ...
Maintaining Web Applications Integrity Running on RADIUM
Maintaining Web Applications Integrity Running on RADIUM
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture...
WEB PROGRAMMING
WEB PROGRAMMING
"Web Programming" is a comprehensive book that provides a detailed overview of various aspects of web programming. The book is co-authored by Dr. Chitra Ravi and Dr. Mohan Kumar S,...
Crosscan: reflected xss scannera website to scan for reflected xss vulnerabilities.
Crosscan: reflected xss scannera website to scan for reflected xss vulnerabilities.
Cross-Site Scripting (XSS) vulnerabilities are one of the most common security issues in web applications, allowing attackers to inject malicious scripts into web pages viewed by o...
Web-based Vulnerability Analysis and Detection
Web-based Vulnerability Analysis and Detection
Background: In today’s digital world, web-based applications are widely used across organizations, making them a primary target for breaches, hacking attempts, ...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by atta...
IMPLEMENTASI OWASP ZAP UNTUK PENGUJIAN KEAMANAN SISTEM INFORMASI AKADEMIK
IMPLEMENTASI OWASP ZAP UNTUK PENGUJIAN KEAMANAN SISTEM INFORMASI AKADEMIK
Information security is an important thing that must be considered for every individual and institution in order to avoid crime. Poor information systems can threaten the critical ...

Back to Top