SlideShare a Scribd company logo
Common Security Issues
in the World Wide Web,
and how to mitigate them
in Web Development
HACKERS
Bad ones want to make money out of what
they know through copying other people’s
private information.
Hackers can pose a serious threat to
your security.
HACKERS
They are people who attempt to breach
online security measures for a number of
reasons:
Good hackers would just want to
emphasize shortfalls to corporations and
other website owners so that they can
tighten their security up.
VIRUSES
Programs which are designed in order to
gain entry onto unsuspecting users’
computers.
attempt to duplicate themselves before
spreading via email, networks and/or
removable storage devices.
VIRUSES
Corrupt or destroy data; otherwise damage
the operation of the machine on which they
reside.
Can be acquired through email, peer-to-peer
downloading, internet messaging services and
downloading infected files found on the
internet.
SPYWARE
To collect personal information and
browsing habits in order to deliver
targeted advertising to you as you browse
the web,
Spyware is software and, like a virus, is
often deceptively added to the user’s
machine.
WORMS
It is a self-replicating
program which will attempt
to spread itself (network, via
routers, internet, email)
which could cause disruption
to computer.
Unlike a virus, a worm does
not need to attach itself to
another program in order to
spread.
SQL INJECTION
• Hackers could get access to your
database by injecting SQL
commands through the input
fields in your website.
• To protect your website from
SQL injection, setting up SQL
parameters is a great help with
this issue.
PHISHING
 Phishing is a type of
scam where the scammers
disguise as a trustworthy
source in attempt to
obtain private information
such as passwords, and
credit card information,
etc. through the internet.
PHISHING
In some respects, phishing is a
confidence trick, designed by would-be
thieves in order to part unsuspecting
computer users from their most precious
personal and/or financial information.
SPAMMING
Spam is any form of unsolicited message
like email, private forum message or
even Tweet.
Spammers can send many thousands of
spam messages out every hour of the day
with no cost.
Therefore, even an incredibly tiny
response rate can lead to huge profits for
the spammers.
SPAMMING
Spam messages don’t usually pose any
threat to your security but can be
incredibly annoying and distracting.
However, spammers could hide other
unwelcome items (viruses, worms, spyware
and other malware) within their spam
messages.
IDENTITY THEFT
This crime can
seriously damage a
victim’s finances for
many years.
Identity thieves
acquire information
about someone through
a variety of means of
which the favourite is
phishing.
IDENTITY THEFT
If they can get personal data, such as
names, dates of birth, social security
numbers, etc, then they can quite literally
steal the identity of the owner of that
information.
IDENTITY THEFT
These thieves fake their identity and use
the victim’s identity in committing crimes,
such as credit card fraud, bank fraud and
other financial misdemeanour
These will then be blamed upon the
victim who will then have a very hard time
and difficulty with clearing their names
and recovering their money.
CROSS-SITE SCRIPTING (XSS)
• This is the injecting of scripting codes
that may have malicious codes that could
allow the attacker to gain access to your
CMS codes, especially with e-commerce
websites, whereas information stored in
the database are vulnerable to such
attacks (Added Bytes
https://www.addedbytes.com ).
CROSS-SITE SCRIPTING (XSS)
• To solve this issue, as a web developer,
you should turn off your trace and track
support on the server and better yet,
remove unwanted characters.
CROSS-SITE REQUEST FORGERY
(CSRF)
• It is one form of website attack where
the attacker is an authenticated user of
the website. The attack, however, is not
known to the user (Added Bytes
https://www.addedbytes.com ).
ERROR MESSAGES
• The error messages that you
should display and provide
the users in your website
should be generic and not
specific.
• In displaying error messages
with user Id and password
inputs, the error message
should indicate that either
of the two field inputs are
incorrect.
SOFTWARE FLAWS
• Flaws allows the internet criminals or
hacker to enter a system or access files
even password is not entered.
DATA POISONING
• Data that are stored in the database are
lost. If it is not detected earlier the
original data is hard to restore or return
to original state.
http://www.forbes.com/sites/kenrapoza/2012/1
2/05/top-10-security-issues-that-will-destroy-
your-computer-in-2013/
http://www.referenceforbusiness.com/small/In
c-Mail/Internet-Security.html
http://www.abs-
cbnnews.com/lifestyle/gadgets-and-
tech/12/09/14/why-you-should-be-careful-
about-sites-you-visit

More Related Content

What's hot

SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
Riya Gupta
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
Samudin Kassan
 

What's hot (20)

Web browser
Web browserWeb browser
Web browser
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
6. Web Publishing
6. Web Publishing6. Web Publishing
6. Web Publishing
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Computer security and
Computer security andComputer security and
Computer security and
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
Anti virus
Anti virusAnti virus
Anti virus
 
Internet features (2nd topic)
Internet features (2nd topic)Internet features (2nd topic)
Internet features (2nd topic)
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Internet
InternetInternet
Internet
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer security
Computer securityComputer security
Computer security
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 

Similar to Common Security Issues on the Internet

Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 
computer crime
computer crimecomputer crime
computer crime
00jitesh00
 

Similar to Common Security Issues on the Internet (20)

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
computer crime
computer crimecomputer crime
computer crime
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
COMPUTER SEMINAR network security threats .pptx
COMPUTER SEMINAR  network security threats .pptxCOMPUTER SEMINAR  network security threats .pptx
COMPUTER SEMINAR network security threats .pptx
 

More from Bretz Harllynne Moltio

More from Bretz Harllynne Moltio (9)

Content Management System and WordPress
Content Management System and WordPressContent Management System and WordPress
Content Management System and WordPress
 
Quiz for Two Speed IT Proj Management
Quiz for Two Speed IT Proj ManagementQuiz for Two Speed IT Proj Management
Quiz for Two Speed IT Proj Management
 
Two Speed IT: How Companies Can Surf the Digital Wave, A BCG Perspective Powe...
Two Speed IT: How Companies Can Surf the Digital Wave, A BCG Perspective Powe...Two Speed IT: How Companies Can Surf the Digital Wave, A BCG Perspective Powe...
Two Speed IT: How Companies Can Surf the Digital Wave, A BCG Perspective Powe...
 
Success Guru - Philip Crosby
Success Guru - Philip CrosbySuccess Guru - Philip Crosby
Success Guru - Philip Crosby
 
Artificial Intelligence and Expert Systems
Artificial Intelligence and Expert SystemsArtificial Intelligence and Expert Systems
Artificial Intelligence and Expert Systems
 
Work and power
Work and powerWork and power
Work and power
 
Matrices - Discrete Structures
Matrices - Discrete StructuresMatrices - Discrete Structures
Matrices - Discrete Structures
 
External memory - Computer Architecture
External memory - Computer ArchitectureExternal memory - Computer Architecture
External memory - Computer Architecture
 
CAR(Benguet Province Culture)
CAR(Benguet Province Culture)CAR(Benguet Province Culture)
CAR(Benguet Province Culture)
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

Common Security Issues on the Internet

  • 1. Common Security Issues in the World Wide Web, and how to mitigate them in Web Development
  • 2.
  • 3. HACKERS Bad ones want to make money out of what they know through copying other people’s private information. Hackers can pose a serious threat to your security.
  • 4.
  • 5. HACKERS They are people who attempt to breach online security measures for a number of reasons: Good hackers would just want to emphasize shortfalls to corporations and other website owners so that they can tighten their security up.
  • 6.
  • 7. VIRUSES Programs which are designed in order to gain entry onto unsuspecting users’ computers. attempt to duplicate themselves before spreading via email, networks and/or removable storage devices.
  • 8. VIRUSES Corrupt or destroy data; otherwise damage the operation of the machine on which they reside. Can be acquired through email, peer-to-peer downloading, internet messaging services and downloading infected files found on the internet.
  • 9. SPYWARE To collect personal information and browsing habits in order to deliver targeted advertising to you as you browse the web, Spyware is software and, like a virus, is often deceptively added to the user’s machine.
  • 10.
  • 11. WORMS It is a self-replicating program which will attempt to spread itself (network, via routers, internet, email) which could cause disruption to computer. Unlike a virus, a worm does not need to attach itself to another program in order to spread.
  • 12. SQL INJECTION • Hackers could get access to your database by injecting SQL commands through the input fields in your website. • To protect your website from SQL injection, setting up SQL parameters is a great help with this issue.
  • 13. PHISHING  Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet.
  • 14. PHISHING In some respects, phishing is a confidence trick, designed by would-be thieves in order to part unsuspecting computer users from their most precious personal and/or financial information.
  • 15. SPAMMING Spam is any form of unsolicited message like email, private forum message or even Tweet. Spammers can send many thousands of spam messages out every hour of the day with no cost. Therefore, even an incredibly tiny response rate can lead to huge profits for the spammers.
  • 16.
  • 17. SPAMMING Spam messages don’t usually pose any threat to your security but can be incredibly annoying and distracting. However, spammers could hide other unwelcome items (viruses, worms, spyware and other malware) within their spam messages.
  • 18. IDENTITY THEFT This crime can seriously damage a victim’s finances for many years. Identity thieves acquire information about someone through a variety of means of which the favourite is phishing.
  • 19. IDENTITY THEFT If they can get personal data, such as names, dates of birth, social security numbers, etc, then they can quite literally steal the identity of the owner of that information.
  • 20. IDENTITY THEFT These thieves fake their identity and use the victim’s identity in committing crimes, such as credit card fraud, bank fraud and other financial misdemeanour These will then be blamed upon the victim who will then have a very hard time and difficulty with clearing their names and recovering their money.
  • 21. CROSS-SITE SCRIPTING (XSS) • This is the injecting of scripting codes that may have malicious codes that could allow the attacker to gain access to your CMS codes, especially with e-commerce websites, whereas information stored in the database are vulnerable to such attacks (Added Bytes https://www.addedbytes.com ).
  • 22. CROSS-SITE SCRIPTING (XSS) • To solve this issue, as a web developer, you should turn off your trace and track support on the server and better yet, remove unwanted characters.
  • 23. CROSS-SITE REQUEST FORGERY (CSRF) • It is one form of website attack where the attacker is an authenticated user of the website. The attack, however, is not known to the user (Added Bytes https://www.addedbytes.com ).
  • 24. ERROR MESSAGES • The error messages that you should display and provide the users in your website should be generic and not specific. • In displaying error messages with user Id and password inputs, the error message should indicate that either of the two field inputs are incorrect.
  • 25. SOFTWARE FLAWS • Flaws allows the internet criminals or hacker to enter a system or access files even password is not entered.
  • 26. DATA POISONING • Data that are stored in the database are lost. If it is not detected earlier the original data is hard to restore or return to original state.