SlideShare a Scribd company logo
1 of 5
Download to read offline
Review Paper
Author
Abdul Razzaq ⇑, Khalid Latif, H. Farooq Ahmad, Ali Hur, Zahid Anwar, Peter Charles Bloods worth School
of Electrical Engineering and Computer Science, National University of Science and Technology,
Islamabad, Pakistan
Nuno Theodoro , ISCTE-IUL School of Technology and Architecture, ISCTE-IUL Lisbon University Institute
Carlos Serrao, ISCTE-IUL School of Technology and Architecture ISCTE-IUL Lisbon University Institute
Ye Zhu, Electrical and Computer Engineering Department, Cleveland State University, Cleveland, OH,
USA
Abstract
we will outline the major security vulnerabilities found in modern web applications. We will then
present and evaluate several tools available for assessing web application. Security and for unveiling the
presence of these vulnerabilities. Some of the tools assessed the security of a whole site
comprehensively while others were created for a more specific task. Providing Web Application Security
for an organization that engages in electronic business is a huge and complex task. The Internet, and in
particular the World Wide Web, have become one of the most common communication mediums in the
World. Millions of users connect everyday to different web-based applications to search for information,
exchange messages, interact with each other, conduct business, pay taxes, perform financial operations
and many more. Strong security in web applications is critical to the success of your online presence.
Security importance has grown massively, especially among web applications.
Introduction
In This Topic We Discussed On Web Applications Security And To Protect Ourselves From Harmful
Activities And Hackers. Because In This World We Have A Lot Of Issues To Face. Because The World
Transfer The Old Generation To A Next Generation So That Is Why Our Data Would Be Unsafe Because
To Much Load/Data On Internet. So There Is A lot Of Organization In The World Who Work For The
Privacy Of There own Companies And There Employees Because Of Hackers And harmful Traffic In
Internet Which Disturb The Data of The Organizations And May Case To Hack The Complete Website
And Stole The Important And Secret Information. So The Mostly companies of the world should be
transferred to an application stage so because there is a less level of chances to hack the applications so
In Complete and finally we said that privacy of web applications are more important than other issues
Most businesses depend on the power of websites to interact with their customers and sell products.
Some technologies are often developed to take care of the different tasks of a website. Thus web
applications have been used increasingly to provide critical security services
Results
So final the result is that the web applications are more safe and reliable than web services on internet.
So it is our responsibility to use web application because web application were controlled by the owner
who gave protection to web application. So I would be said to author that you make tiny changes in
research article which is that the organization must start a campaign on start in web application over
web services. but in the other hand I also said that when you use web application keep in mind that
there are some application which are really a harmful for us. That these types of applications are made
by the author who is not officially recommended by play store. So that play store or a window do not
take responsibilities when the owner data stole or hack.
Conclusion
Cyber security concerns have increased rapidly in recent years and are raising serious doubts regarding
an emerging part of the global economy. Critical web applications quality cannot be separated from
security problems. In those all research articles I see the web security and frameworks and there
security problem. Security must be present in every critical web application as it is a quality measure
every user take as granted. Some well-defined frameworks, which integrate security with the SDLC,
were explained in this paper. Web applications are nowadays the gateway between people and
everyday operations with the entire world. This must be understood, and therefore, quality standards
must be raised, which from our point of view, it can only happen with the increase of security. Security
Reference
{ 1] V. B. Livshits and M. S. Lam, “Finding security vulnerabilities in java applications with static analysis.”
in Usenix Security, vol. 2013, 2005.
[2] M. Curphey and R. Arawo, “Web application security assessment tools,”
IEEE Security & Privacy, vol. 4, no. 4, pp. 32–41, 2006.
[3] Waleed Alrodhan, Identity management systems, Digital Identity and Access Management:
Technologies and Frameworks (2011) 209.
[4] Rohan Amin, Julie Ryan, Johan van Dorp, Detecting targeted malicious email, Security & Privacy, IEEE
10 (3) (2012) 64–71.
[5] A. Anitha, V. Vaidehi, Context based application level intrusion detection system, in: International
conference on Networking and Services, 2006,
ICNS’06, IEEE, 2006, p. 16.
[6] MARK CURPHEY ET AL.; A guide to building secure web applications; referenced
on 9.10.2002; 2002.
URL http://www.owasp.org/guide/
[7] CERT; Advisory ca-2000-02: malicious html tags embedded in client web requests;
referenced on 5.10.2002; 2000.
URL http://www.cert.org/advisories/CA-2000-02.html
[8] W. Stallings, Network security essentials: applications and standards.
Pearson Education India, 2007.
[9] T. Dierks, “The transport layer security (tls) protocol version 1.2,” 2008.
[10] S. McClure, J. Scambray, G. Kurtz, and Kurtz, Hacking exposed:
network security secrets and solutions. McGraw-Hill/Osborne New
York, 2005.
[11] Q. Inc. (2015) Ssl server rating guide. [Online]. Available: https:
//www.ssllabs.com/
[12] OWASP (2010a). OWASP Top 10 - 2010, The Ten Most Critical Web
Application Security Risks. OW ASP.
[13] OWASP (2010b). Owasp web site. http://www.owasp.org/. (Access
date: IS June 2011).
[14] OWASP (20 IOc). Software Assurance Maturity Model - A guide to
building security into software development - version 1.0. OWASP.
[ IS] OWASP (2011a). Owasp code review project.
http://www.owasp.orglindex.php/Category: OWASPCodeReviewPro
ject. (Access date: IS June 2011).
[16] OWASP (201Ib). Owasp live
http://www.owasp.orglindex.php/Category:
(Access date: IS June 20 I I).
cd project.
OW ASPLiveCDProject.
[17] OWASP (201Ic). Owasp threat risk modeling.
http://www.owasp.orglindex.php/ ThreatRiskModeling. (Access date: IS
June 2011).
[18] Simplex (2010). Simplex web-site. http://www.simplex.ptlindex.asp.
(Access date: IS June 2011).
[19] Striletchi, C. and Vaida, M.-F. (2003). Enhancing the secu- rity of web
applications. In Information Technology Interfaces, 2003. IT! 2003.
Proceedings of the 25th International Conference on, pages 463 - 468.
[20] Trifonov, G. (2009). Reducing the number of security vul- nerabilitiesin
web applications by improving software quality. In IEEE 5th
International Symposium on Applied Computational Intelligence and
Informatics, pages 51-54. IEEE.
Review Paper ( Research Articles )

More Related Content

What's hot

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
Jack McCullough
 

What's hot (19)

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuse
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
 
Eliminating Security Uncertainty
Eliminating Security UncertaintyEliminating Security Uncertainty
Eliminating Security Uncertainty
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threats
 

Similar to Review Paper ( Research Articles )

AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
SALU18
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
STO STRATEGY
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
Bee_Ware
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 

Similar to Review Paper ( Research Articles ) (20)

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Project 3
Project 3Project 3
Project 3
 
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 

More from SaadSaif6 (6)

Fourier transform (cell phones)
Fourier transform (cell phones)Fourier transform (cell phones)
Fourier transform (cell phones)
 
Correlation Coefficient
Correlation CoefficientCorrelation Coefficient
Correlation Coefficient
 
America-Iran Tensions ( Best & Easy Presentation )
America-Iran Tensions ( Best & Easy Presentation )America-Iran Tensions ( Best & Easy Presentation )
America-Iran Tensions ( Best & Easy Presentation )
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
 
Trapezoidal Rule
Trapezoidal RuleTrapezoidal Rule
Trapezoidal Rule
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Review Paper ( Research Articles )

  • 1. Review Paper Author Abdul Razzaq ⇑, Khalid Latif, H. Farooq Ahmad, Ali Hur, Zahid Anwar, Peter Charles Bloods worth School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan Nuno Theodoro , ISCTE-IUL School of Technology and Architecture, ISCTE-IUL Lisbon University Institute Carlos Serrao, ISCTE-IUL School of Technology and Architecture ISCTE-IUL Lisbon University Institute Ye Zhu, Electrical and Computer Engineering Department, Cleveland State University, Cleveland, OH, USA Abstract we will outline the major security vulnerabilities found in modern web applications. We will then present and evaluate several tools available for assessing web application. Security and for unveiling the presence of these vulnerabilities. Some of the tools assessed the security of a whole site comprehensively while others were created for a more specific task. Providing Web Application Security for an organization that engages in electronic business is a huge and complex task. The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Introduction In This Topic We Discussed On Web Applications Security And To Protect Ourselves From Harmful Activities And Hackers. Because In This World We Have A Lot Of Issues To Face. Because The World Transfer The Old Generation To A Next Generation So That Is Why Our Data Would Be Unsafe Because To Much Load/Data On Internet. So There Is A lot Of Organization In The World Who Work For The Privacy Of There own Companies And There Employees Because Of Hackers And harmful Traffic In Internet Which Disturb The Data of The Organizations And May Case To Hack The Complete Website And Stole The Important And Secret Information. So The Mostly companies of the world should be transferred to an application stage so because there is a less level of chances to hack the applications so In Complete and finally we said that privacy of web applications are more important than other issues Most businesses depend on the power of websites to interact with their customers and sell products.
  • 2. Some technologies are often developed to take care of the different tasks of a website. Thus web applications have been used increasingly to provide critical security services Results So final the result is that the web applications are more safe and reliable than web services on internet. So it is our responsibility to use web application because web application were controlled by the owner who gave protection to web application. So I would be said to author that you make tiny changes in research article which is that the organization must start a campaign on start in web application over web services. but in the other hand I also said that when you use web application keep in mind that there are some application which are really a harmful for us. That these types of applications are made by the author who is not officially recommended by play store. So that play store or a window do not take responsibilities when the owner data stole or hack. Conclusion Cyber security concerns have increased rapidly in recent years and are raising serious doubts regarding an emerging part of the global economy. Critical web applications quality cannot be separated from security problems. In those all research articles I see the web security and frameworks and there security problem. Security must be present in every critical web application as it is a quality measure every user take as granted. Some well-defined frameworks, which integrate security with the SDLC, were explained in this paper. Web applications are nowadays the gateway between people and everyday operations with the entire world. This must be understood, and therefore, quality standards must be raised, which from our point of view, it can only happen with the increase of security. Security Reference { 1] V. B. Livshits and M. S. Lam, “Finding security vulnerabilities in java applications with static analysis.” in Usenix Security, vol. 2013, 2005. [2] M. Curphey and R. Arawo, “Web application security assessment tools,” IEEE Security & Privacy, vol. 4, no. 4, pp. 32–41, 2006. [3] Waleed Alrodhan, Identity management systems, Digital Identity and Access Management: Technologies and Frameworks (2011) 209. [4] Rohan Amin, Julie Ryan, Johan van Dorp, Detecting targeted malicious email, Security & Privacy, IEEE 10 (3) (2012) 64–71. [5] A. Anitha, V. Vaidehi, Context based application level intrusion detection system, in: International conference on Networking and Services, 2006, ICNS’06, IEEE, 2006, p. 16.
  • 3. [6] MARK CURPHEY ET AL.; A guide to building secure web applications; referenced on 9.10.2002; 2002. URL http://www.owasp.org/guide/ [7] CERT; Advisory ca-2000-02: malicious html tags embedded in client web requests; referenced on 5.10.2002; 2000. URL http://www.cert.org/advisories/CA-2000-02.html [8] W. Stallings, Network security essentials: applications and standards. Pearson Education India, 2007. [9] T. Dierks, “The transport layer security (tls) protocol version 1.2,” 2008. [10] S. McClure, J. Scambray, G. Kurtz, and Kurtz, Hacking exposed: network security secrets and solutions. McGraw-Hill/Osborne New York, 2005. [11] Q. Inc. (2015) Ssl server rating guide. [Online]. Available: https: //www.ssllabs.com/ [12] OWASP (2010a). OWASP Top 10 - 2010, The Ten Most Critical Web Application Security Risks. OW ASP. [13] OWASP (2010b). Owasp web site. http://www.owasp.org/. (Access date: IS June 2011). [14] OWASP (20 IOc). Software Assurance Maturity Model - A guide to building security into software development - version 1.0. OWASP. [ IS] OWASP (2011a). Owasp code review project. http://www.owasp.orglindex.php/Category: OWASPCodeReviewPro ject. (Access date: IS June 2011). [16] OWASP (201Ib). Owasp live http://www.owasp.orglindex.php/Category:
  • 4. (Access date: IS June 20 I I). cd project. OW ASPLiveCDProject. [17] OWASP (201Ic). Owasp threat risk modeling. http://www.owasp.orglindex.php/ ThreatRiskModeling. (Access date: IS June 2011). [18] Simplex (2010). Simplex web-site. http://www.simplex.ptlindex.asp. (Access date: IS June 2011). [19] Striletchi, C. and Vaida, M.-F. (2003). Enhancing the secu- rity of web applications. In Information Technology Interfaces, 2003. IT! 2003. Proceedings of the 25th International Conference on, pages 463 - 468. [20] Trifonov, G. (2009). Reducing the number of security vul- nerabilitiesin web applications by improving software quality. In IEEE 5th International Symposium on Applied Computational Intelligence and Informatics, pages 51-54. IEEE.