SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3536
Underpinning the Impact of Web Application Security on Businesses
and Organizations
Labaran Idris Jega[1] , Abdulaziz Salihu Aliero[2], Umar Bawa Abdulmajid[3]
1,2,3Kebbi State University of Science and Technology, Aliero, Kebbi State, Nigeria
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - This paper will present an approach towards
discussing one of the world’s major development in the IT
sector in the name of Web Application. Today, web
applications have made a massive impact on millions of
businesses and organizations especially by drastically
minimizing cost, labor, efficiency and many others. Web
application has gone beyond just a common web page, rather,
to a much bigger tool which enables numerous organizations
to smoothen and enhancing their business capabilities in
terms of interacting with thousands of business partners,
customers and even retailers. Moreover, this paper’s main
objective is on discussing an in depth overview of Web
Application and web application security, the common
functions of web application, the most commonvulnerabilities
in web application and their solution solutions, the attributes,
as well as the underlying structure of web application, so asto
enable the reader to have a theoretical as well as technical
overview of the discourse in questions.
Key Words: Web security,sessionhijacking,ecommerce,
security, hacking, ecommerce security,
1. INTRODUCTION
The influence of web based applications is disputably the
single most significant event in antiquity of computing. As
web app flourished in importance, a discipline Web
engineering approach adapted from software engineering
principles, concepts process and methods has begun to
evolve. Hence, Web apps are different from other
classifications of computer software. They are network
intensive, content driven, and continuous evolving products
[1].
In a nutshell, unlike a website that simply provides its users
with the opportunity to read informationthroughthe WWW
windows; “a Web Application can be considered as a
software system that exploits the WWW infrastructure to
offer its users the opportunity to modify the status of the
system and of the business it supports”. In contrast, web
applications are programs that are deployed in a novel way,
allowing them to be accessed remotely across the internet.
The first programs deployed on the web were simple
applications that accepted form data from HTML pages and
processed or stored the data. Today, modern applications
are sophisticated, interactive programs with complex GUIs
and numerous back-end software components that are
integrated in novel and interesting ways [2].
2. THE CONCEPT OF WEB APPLICATION
As the world embraces cloud computing, more and more
people are transacting business,conductingresearch,storing
information, collaborating with co-workers, publishing
personal thoughts, and fostering relationships via web
Applications. In order to understandWebApplication,firstof
all, let’s define web application properly:webApplicationisa
client-server application program that is stored on a remote
server and delivered over the internet through a browser
interface. However, we can elaborate by saying that web
application or web app is a software program that runs on a
web server. Unlike traditional desktop applications, which
are launched by our operating systems, web apps must be
accessed through web browsers [3].
Web appshaveseveraladvantagesoverdesktopapplications.
Since they run inside web browsers, developers do not need
to develop web apps formultipleplatforms.Thus,developers
do not need to distribute software updates to users whenthe
web app is updated. (See figure 1). By updating the application on
the server, all users access to the updated version. From a
user standpoint, a web app may provide a more consistent
user interface across multiple platforms because the
appearance is dependent on the browser rather than the
operating system. Additionally, the data you enter into aweb
app is processed and saved remotely. This allows you to
access the same data from multiple devices, rather than
transferring files between computer systems [5] .
Fig1: Structure Of Web Application
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3537
While web applications offer several benefits, they do have
somedisadvantages compared todesktopapplications.Since
they do not run directly fromthe operatingsystem,theyhave
limited access to system resources, suchastheCPU,memory,
and the file system. Therefore, high-end programs, such as
video production and other media apps generally perform
better as desktop applications. Web apps are also entirely
dependent on the web browser. If your browser crashes, for
example, you may lose your unsaved progress. Also,browser
updates may cause incompatibilities with web apps,creating
unexpected issues [6] .
3. WEB APPLICATION FUNCTIONS
Web application have been created to perform practically
every useful function you could possibly implement online.
Below are someweb applications functionsthathaverisento
prominence in recent trends:
a. E-shopping and e-business such as Amazon and
FlipKart
b. Banking and e-money
c. Social Network such as Facebook, LinkedIn
d. Web search like in Google search app for android
e. Auctions such as eBay
f. Web blogs and etc.
Applications that are accessed using a computer browser
increasingly overlap with mobile applications that are
accessed using a smartphone or tablet. Most mobile
applications employ either a browser or a customized client
that uses HTTP-based APIs to communicate with the server.
Application functions and data typically are shared between
the various interfaces that the application exposes to
different user platforms [7].
4. WEB APPLICATION SECURITY
Web application security is a branch of information security
that’s deals specifically with security of websites, web
applications and web services. At the high level, web
application security draws on the principles of application
security but applies them specifically to internet and web
systems. As with any new class of technology, web
applications have brought with them a new range of security
vulnerabilities. The set of most commonly encountered
defects has evolved somewhat over time. New attacks have
been conceived that were not considered when existing
applications were developed. Some problems have become
less prevalent as awareness of them has increased. New
technologies have been developed that have introduced new
possibilities for exploitation. Some categories of flaws have
largely gone away as the result of changes made to web
browser software [7].
The most serious attacks against web applications are those
that expose sensitive data or gain unrestricted access to the
back-end systems on which the application is running. High-
profile compromises of this kind continue to occur
frequently[8] . For many organizations, however, any attack
that causes system downtime is a critical event. Application-
level denial-of-service attacks can be used to achieve the
same results as traditional resource exhaustion attacks
against infrastructure. However, they are often used with
more subtle techniques and objectives. They may be used to
disrupt a particular user or service togainacompetitiveedge
against peers in the realms of financial trading, gaming,
online bidding, and ticket reservations.
5. KEY PROBLEM OF WEB APPLICATION
Most of web applications that use a database build an SQL
statement based on user input. This means if the SQL
statement-buildingprocessisnotsecurelyguarded,attacking
and manipulating the database would become possible. This
issue is called “SQL Injection vulnerability” and the attacking
method exploiting this vulnerability is called “SQL Injection
attack”. (See figure 2)
Fig 2: Sql Injection Attack
5.2.1 Solution for SQL Injection
Usually, the SQL has a mechanism to build an SQL statement
using placeholders. It is a mechanism to put a symbol
(placeholder) at the place of the variables in the template of
an SQL statement and replacing it with an actual data value
mechanically later.
The majority of web applications are insecure, despite the
widespread usage of SSL technology. However,professionals
have pin pointed several instances of problems or attacks
that are liable to invade any web application security [9]. Ten
most critical web application security vulnerability were
highlighted, although, only few shall be discussed in this
paper:
5.1 SQL Injection
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3538
5.3 Unchecked Path Parameter
Some web applications allow to specify the name of files
stored on the web server directly using external parameters.
If such web application is not carefully programmed,
attackers may specify an arbitrary file and have the web
application execute unintended operations. This issue is
called “Directory Traversal vulnerability” and one of the
attacking methods exploiting this vulnerability is called
“Directory Traversal attack”.
Fig3: Unchecked Path
5.3.1 Solution For Unchecked Path
When a web application allows a filename to be specified
directly using an external parameter, an attacker could
manipulatethe parameter specifying arbitraryfilesandview
the file contents that should not be disclosed. For example,in
an implementationcase where the name ofafilestoredinthe
web server is specified in the hidden parameter and that file
is used in the web page template, an attacker can output
arbitrary file as a web page by manipulating the parameter.
5.4 Improper Session Management
Some web applications issue session ID, which is the
information to identify the user, to manage sessions. If
session ID is not created and managed properly, an attacker
could steal the session ID of a legitimate user and gain
unauthorized access to the services pretending to be the
legitimate user. The attacking method exploiting this
vulnerability in session management is called “Session
Hijacking”.
Fig4: Session Hijacking
5.4.1 Solution For Session Hijacking
If the session ID is fixed for each user, an attacker can
perform session hijacking attacks anytime without time
limitation once the attacker obtainsthesessionID.Donotuse
a fixed session ID and create a new session ID each time the
user logs in.
5.5 Inefficient Authentication And Authorization
Technique
It is absolutely true that some web applications are not
properly and adequately secured. One could understandthat
from the way they fail authenticationandauthorizationtests.
Password has been the line if defense for many web
applications. However, password has proven to be weak
when it comes to authentication. With a simple brute force
tool, intruder can be able to crack the passwords within no
time. More so, not all application users should be given
elevated authorizations. Some disgruntled employees could
use their authorization level to harm the web application.
5.5.1 Solution To Inefficient Authentication And
Authorization
To tackle authentication issues, implementatwotierorthree
tier authenticationmethodwhichmaycompriseofpassword,
token codes, anda security question or security questioncan
be substituted with thump scanner for retina recognition
depending on the budget of the company. Furthermore,least
privileges should be given to low level users, this could
protect application from intentional harm or unintentional
harm. Also, admin login should only be used only when
necessary.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3539
To safely operate a website, the administrator should not
only secureweb applicationsbut alsosecurelyguardtheweb
server. Thus the following recommendations help in
hardening the chances of invading the system [4] .
a. Check OS and software vulnerability
information constantly and take necessary
actions accordingly.
b. Implement an authentication mechanism other
than using password for remote server access.
c. When using password authentication, make
sure to use a sufficiently complex string
d. Disable unused servicesanddeleteunnecessary
accounts
e. Do not place a file you do not intent to make
public under the public directory on the web
server
To end this discussion, it is important for me to give a brief
overview or an executive summary of what this paper
contains. This paper starts with an introductory part where
we have enumerated some various definitions web
application and web application security. Both of them are
subsidiaries of information security and they deal strictly
with how user or organization tackles any form of security
breach that could cause any violation of privacy or exposure
of internal security in an organization. Subsequently, this
paper discussed in depth the common example or instances
of web application security problems, where we mentioned
certain points that we think are responsible for the breachof
security. Although, other types of web application problems
were not mentioned due to limited time and resources. But
the few others that we have left include Cross-site scripting,
OS command injection, Cross-site request forgery and so on
(Durkee, 2010).
Finally it is important to notethat, in spite of all the efforts to
eliminate these threats, yet, there are millions of people out
there who spend sleepless nights trying to identifying new
exploits that could be used to compromise various security
infrastructures.
BIBLIOGRAPHY
1. IBM. (2008). Understanding Web application
security challenges ., (January)
2. Wiesmann, A., Stock, a Van Der, Curphey, M., &
Stirbei, R. (2005). A guide to building secure web
applications and web services. The Open Web
Application Security Project, 101–137, 147–160.
Retrieved from
http://scholar.google.com/scholar?hl=en&btnG=Sea
rch&q=intitle:A+Guide+to+Building+Secure+Web+A
pplications+and+Web+Services#2
3. Li, X., & Xue, Y. (2011). A survey on web application
security. Nashville, TN USA, 25(5), 1–14. Retrieved
from
http://isis.vanderbilt.edu/sites/default/files/main_
0.pdf
4. Zinger, P. (n.d.). Six Essential Elements of Web
Application Security Cost Effective Strategies for
Defending Your Business. Retrieved from
https://www.whitepapers.em360tech.com/wp-
content/uploads/The-Six-Essential-Elements-of-
Cost-Effective-Web-Application-Security.pdf
5. Belfort, M. A., & Saade, G. R. (n.d.). Web Application
Security. World Wide Web Internet And Web
Information Systems, 210(10), 1–37.
https://doi.org/10.1385/1592592910
6. Hoff, J. (n.d.). A Strategic Approach to Web
Application Security. WhiteHat Security.
7. Government, T. H. K. A. (2008). Web Application
Security, (February), 26.
https://doi.org/10.1007/978-3-642-16120-9
8. Web Application Security Standards and Practices.
(2011), 1(January), 1–13.
9. Stuttard, D., & Pinto, M. (2011). The Web Application
Hacker’s Handbook. Indianapolis:JohnWiley&Sons,
Inc.
7. CONCLUSIONS
6. OTHER SECURITY MEASURES FOR SECURING
WEB APPLICATION

More Related Content

What's hot

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
TJR Global
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
cloudresearcher
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
Kim Jensen
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
EPC Group
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
GFI Software
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
Ivanti
 
Web vulnerabilities
Web vulnerabilitiesWeb vulnerabilities
Web vulnerabilities
Krishna Gehlot
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
Sentri
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
David J Rosenthal
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft Private Cloud
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
IJMIT JOURNAL
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
IBMGovernmentCA
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
TobyRobinson13
 

What's hot (19)

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Conne...
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
EPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities OverviewEPC Group Intune Practice and Capabilities Overview
EPC Group Intune Practice and Capabilities Overview
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Web vulnerabilities
Web vulnerabilitiesWeb vulnerabilities
Web vulnerabilities
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
Microsoft India - Technical Overview of Direct Access in Windows 7 and Window...
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
 

Similar to IRJET- Underpinning the Impact of Web Application Security on Businesses and Organizations

Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
IRJET Journal
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and Discussion
EECJOURNAL
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
IRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading ApplicationsIRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading Applications
IRJET Journal
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
IJCSEA Journal
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
Web Application Architecture: Everything You Need to Know About
Web Application Architecture: Everything You Need to Know AboutWeb Application Architecture: Everything You Need to Know About
Web Application Architecture: Everything You Need to Know About
Noman Shaikh
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
VESIT/University of Mumbai
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...
IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...
IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...
IRJET Journal
 

Similar to IRJET- Underpinning the Impact of Web Application Security on Businesses and Organizations (20)

Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and Discussion
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
IRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading ApplicationsIRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading Applications
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Web Application Architecture: Everything You Need to Know About
Web Application Architecture: Everything You Need to Know AboutWeb Application Architecture: Everything You Need to Know About
Web Application Architecture: Everything You Need to Know About
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...
IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...
IRJET- A Repository Application Developed using .Net MVC and Angularjs for In...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
Kuvempu University
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
supriyaDicholkar1
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
Properties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure MeasurementProperties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure Measurement
Indrajeet sahu
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
foxlyon
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
ELS: 2.4.1 POWER ELECTRONICS Course objectives: This course will enable stude...
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
Properties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure MeasurementProperties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure Measurement
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

IRJET- Underpinning the Impact of Web Application Security on Businesses and Organizations

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3536 Underpinning the Impact of Web Application Security on Businesses and Organizations Labaran Idris Jega[1] , Abdulaziz Salihu Aliero[2], Umar Bawa Abdulmajid[3] 1,2,3Kebbi State University of Science and Technology, Aliero, Kebbi State, Nigeria ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This paper will present an approach towards discussing one of the world’s major development in the IT sector in the name of Web Application. Today, web applications have made a massive impact on millions of businesses and organizations especially by drastically minimizing cost, labor, efficiency and many others. Web application has gone beyond just a common web page, rather, to a much bigger tool which enables numerous organizations to smoothen and enhancing their business capabilities in terms of interacting with thousands of business partners, customers and even retailers. Moreover, this paper’s main objective is on discussing an in depth overview of Web Application and web application security, the common functions of web application, the most commonvulnerabilities in web application and their solution solutions, the attributes, as well as the underlying structure of web application, so asto enable the reader to have a theoretical as well as technical overview of the discourse in questions. Key Words: Web security,sessionhijacking,ecommerce, security, hacking, ecommerce security, 1. INTRODUCTION The influence of web based applications is disputably the single most significant event in antiquity of computing. As web app flourished in importance, a discipline Web engineering approach adapted from software engineering principles, concepts process and methods has begun to evolve. Hence, Web apps are different from other classifications of computer software. They are network intensive, content driven, and continuous evolving products [1]. In a nutshell, unlike a website that simply provides its users with the opportunity to read informationthroughthe WWW windows; “a Web Application can be considered as a software system that exploits the WWW infrastructure to offer its users the opportunity to modify the status of the system and of the business it supports”. In contrast, web applications are programs that are deployed in a novel way, allowing them to be accessed remotely across the internet. The first programs deployed on the web were simple applications that accepted form data from HTML pages and processed or stored the data. Today, modern applications are sophisticated, interactive programs with complex GUIs and numerous back-end software components that are integrated in novel and interesting ways [2]. 2. THE CONCEPT OF WEB APPLICATION As the world embraces cloud computing, more and more people are transacting business,conductingresearch,storing information, collaborating with co-workers, publishing personal thoughts, and fostering relationships via web Applications. In order to understandWebApplication,firstof all, let’s define web application properly:webApplicationisa client-server application program that is stored on a remote server and delivered over the internet through a browser interface. However, we can elaborate by saying that web application or web app is a software program that runs on a web server. Unlike traditional desktop applications, which are launched by our operating systems, web apps must be accessed through web browsers [3]. Web appshaveseveraladvantagesoverdesktopapplications. Since they run inside web browsers, developers do not need to develop web apps formultipleplatforms.Thus,developers do not need to distribute software updates to users whenthe web app is updated. (See figure 1). By updating the application on the server, all users access to the updated version. From a user standpoint, a web app may provide a more consistent user interface across multiple platforms because the appearance is dependent on the browser rather than the operating system. Additionally, the data you enter into aweb app is processed and saved remotely. This allows you to access the same data from multiple devices, rather than transferring files between computer systems [5] . Fig1: Structure Of Web Application
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3537 While web applications offer several benefits, they do have somedisadvantages compared todesktopapplications.Since they do not run directly fromthe operatingsystem,theyhave limited access to system resources, suchastheCPU,memory, and the file system. Therefore, high-end programs, such as video production and other media apps generally perform better as desktop applications. Web apps are also entirely dependent on the web browser. If your browser crashes, for example, you may lose your unsaved progress. Also,browser updates may cause incompatibilities with web apps,creating unexpected issues [6] . 3. WEB APPLICATION FUNCTIONS Web application have been created to perform practically every useful function you could possibly implement online. Below are someweb applications functionsthathaverisento prominence in recent trends: a. E-shopping and e-business such as Amazon and FlipKart b. Banking and e-money c. Social Network such as Facebook, LinkedIn d. Web search like in Google search app for android e. Auctions such as eBay f. Web blogs and etc. Applications that are accessed using a computer browser increasingly overlap with mobile applications that are accessed using a smartphone or tablet. Most mobile applications employ either a browser or a customized client that uses HTTP-based APIs to communicate with the server. Application functions and data typically are shared between the various interfaces that the application exposes to different user platforms [7]. 4. WEB APPLICATION SECURITY Web application security is a branch of information security that’s deals specifically with security of websites, web applications and web services. At the high level, web application security draws on the principles of application security but applies them specifically to internet and web systems. As with any new class of technology, web applications have brought with them a new range of security vulnerabilities. The set of most commonly encountered defects has evolved somewhat over time. New attacks have been conceived that were not considered when existing applications were developed. Some problems have become less prevalent as awareness of them has increased. New technologies have been developed that have introduced new possibilities for exploitation. Some categories of flaws have largely gone away as the result of changes made to web browser software [7]. The most serious attacks against web applications are those that expose sensitive data or gain unrestricted access to the back-end systems on which the application is running. High- profile compromises of this kind continue to occur frequently[8] . For many organizations, however, any attack that causes system downtime is a critical event. Application- level denial-of-service attacks can be used to achieve the same results as traditional resource exhaustion attacks against infrastructure. However, they are often used with more subtle techniques and objectives. They may be used to disrupt a particular user or service togainacompetitiveedge against peers in the realms of financial trading, gaming, online bidding, and ticket reservations. 5. KEY PROBLEM OF WEB APPLICATION Most of web applications that use a database build an SQL statement based on user input. This means if the SQL statement-buildingprocessisnotsecurelyguarded,attacking and manipulating the database would become possible. This issue is called “SQL Injection vulnerability” and the attacking method exploiting this vulnerability is called “SQL Injection attack”. (See figure 2) Fig 2: Sql Injection Attack 5.2.1 Solution for SQL Injection Usually, the SQL has a mechanism to build an SQL statement using placeholders. It is a mechanism to put a symbol (placeholder) at the place of the variables in the template of an SQL statement and replacing it with an actual data value mechanically later. The majority of web applications are insecure, despite the widespread usage of SSL technology. However,professionals have pin pointed several instances of problems or attacks that are liable to invade any web application security [9]. Ten most critical web application security vulnerability were highlighted, although, only few shall be discussed in this paper: 5.1 SQL Injection
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3538 5.3 Unchecked Path Parameter Some web applications allow to specify the name of files stored on the web server directly using external parameters. If such web application is not carefully programmed, attackers may specify an arbitrary file and have the web application execute unintended operations. This issue is called “Directory Traversal vulnerability” and one of the attacking methods exploiting this vulnerability is called “Directory Traversal attack”. Fig3: Unchecked Path 5.3.1 Solution For Unchecked Path When a web application allows a filename to be specified directly using an external parameter, an attacker could manipulatethe parameter specifying arbitraryfilesandview the file contents that should not be disclosed. For example,in an implementationcase where the name ofafilestoredinthe web server is specified in the hidden parameter and that file is used in the web page template, an attacker can output arbitrary file as a web page by manipulating the parameter. 5.4 Improper Session Management Some web applications issue session ID, which is the information to identify the user, to manage sessions. If session ID is not created and managed properly, an attacker could steal the session ID of a legitimate user and gain unauthorized access to the services pretending to be the legitimate user. The attacking method exploiting this vulnerability in session management is called “Session Hijacking”. Fig4: Session Hijacking 5.4.1 Solution For Session Hijacking If the session ID is fixed for each user, an attacker can perform session hijacking attacks anytime without time limitation once the attacker obtainsthesessionID.Donotuse a fixed session ID and create a new session ID each time the user logs in. 5.5 Inefficient Authentication And Authorization Technique It is absolutely true that some web applications are not properly and adequately secured. One could understandthat from the way they fail authenticationandauthorizationtests. Password has been the line if defense for many web applications. However, password has proven to be weak when it comes to authentication. With a simple brute force tool, intruder can be able to crack the passwords within no time. More so, not all application users should be given elevated authorizations. Some disgruntled employees could use their authorization level to harm the web application. 5.5.1 Solution To Inefficient Authentication And Authorization To tackle authentication issues, implementatwotierorthree tier authenticationmethodwhichmaycompriseofpassword, token codes, anda security question or security questioncan be substituted with thump scanner for retina recognition depending on the budget of the company. Furthermore,least privileges should be given to low level users, this could protect application from intentional harm or unintentional harm. Also, admin login should only be used only when necessary.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3539 To safely operate a website, the administrator should not only secureweb applicationsbut alsosecurelyguardtheweb server. Thus the following recommendations help in hardening the chances of invading the system [4] . a. Check OS and software vulnerability information constantly and take necessary actions accordingly. b. Implement an authentication mechanism other than using password for remote server access. c. When using password authentication, make sure to use a sufficiently complex string d. Disable unused servicesanddeleteunnecessary accounts e. Do not place a file you do not intent to make public under the public directory on the web server To end this discussion, it is important for me to give a brief overview or an executive summary of what this paper contains. This paper starts with an introductory part where we have enumerated some various definitions web application and web application security. Both of them are subsidiaries of information security and they deal strictly with how user or organization tackles any form of security breach that could cause any violation of privacy or exposure of internal security in an organization. Subsequently, this paper discussed in depth the common example or instances of web application security problems, where we mentioned certain points that we think are responsible for the breachof security. Although, other types of web application problems were not mentioned due to limited time and resources. But the few others that we have left include Cross-site scripting, OS command injection, Cross-site request forgery and so on (Durkee, 2010). Finally it is important to notethat, in spite of all the efforts to eliminate these threats, yet, there are millions of people out there who spend sleepless nights trying to identifying new exploits that could be used to compromise various security infrastructures. BIBLIOGRAPHY 1. IBM. (2008). Understanding Web application security challenges ., (January) 2. Wiesmann, A., Stock, a Van Der, Curphey, M., & Stirbei, R. (2005). A guide to building secure web applications and web services. The Open Web Application Security Project, 101–137, 147–160. Retrieved from http://scholar.google.com/scholar?hl=en&btnG=Sea rch&q=intitle:A+Guide+to+Building+Secure+Web+A pplications+and+Web+Services#2 3. Li, X., & Xue, Y. (2011). A survey on web application security. Nashville, TN USA, 25(5), 1–14. Retrieved from http://isis.vanderbilt.edu/sites/default/files/main_ 0.pdf 4. Zinger, P. (n.d.). Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business. Retrieved from https://www.whitepapers.em360tech.com/wp- content/uploads/The-Six-Essential-Elements-of- Cost-Effective-Web-Application-Security.pdf 5. Belfort, M. A., & Saade, G. R. (n.d.). Web Application Security. World Wide Web Internet And Web Information Systems, 210(10), 1–37. https://doi.org/10.1385/1592592910 6. Hoff, J. (n.d.). A Strategic Approach to Web Application Security. WhiteHat Security. 7. Government, T. H. K. A. (2008). Web Application Security, (February), 26. https://doi.org/10.1007/978-3-642-16120-9 8. Web Application Security Standards and Practices. (2011), 1(January), 1–13. 9. Stuttard, D., & Pinto, M. (2011). The Web Application Hacker’s Handbook. Indianapolis:JohnWiley&Sons, Inc. 7. CONCLUSIONS 6. OTHER SECURITY MEASURES FOR SECURING WEB APPLICATION