SlideShare a Scribd company logo
Review Paper
Author
Abdul Razzaq ⇑, Khalid Latif, H. Farooq Ahmad, Ali Hur, Zahid Anwar, Peter Charles Bloods worth School
of Electrical Engineering and Computer Science, National University of Science and Technology,
Islamabad, Pakistan
Nuno Theodoro , ISCTE-IUL School of Technology and Architecture, ISCTE-IUL Lisbon University Institute
Carlos Serrao, ISCTE-IUL School of Technology and Architecture ISCTE-IUL Lisbon University Institute
Ye Zhu, Electrical and Computer Engineering Department, Cleveland State University, Cleveland, OH,
USA
Abstract
we will outline the major security vulnerabilities found in modern web applications. We will then
present and evaluate several tools available for assessing web application. Security and for unveiling the
presence of these vulnerabilities. Some of the tools assessed the security of a whole site
comprehensively while others were created for a more specific task. Providing Web Application Security
for an organization that engages in electronic business is a huge and complex task. The Internet, and in
particular the World Wide Web, have become one of the most common communication mediums in the
World. Millions of users connect everyday to different web-based applications to search for information,
exchange messages, interact with each other, conduct business, pay taxes, perform financial operations
and many more. Strong security in web applications is critical to the success of your online presence.
Security importance has grown massively, especially among web applications.
Introduction
In This Topic We Discussed On Web Applications Security And To Protect Ourselves From Harmful
Activities And Hackers. Because In This World We Have A Lot Of Issues To Face. Because The World
Transfer The Old Generation To A Next Generation So That Is Why Our Data Would Be Unsafe Because
To Much Load/Data On Internet. So There Is A lot Of Organization In The World Who Work For The
Privacy Of There own Companies And There Employees Because Of Hackers And harmful Traffic In
Internet Which Disturb The Data of The Organizations And May Case To Hack The Complete Website
And Stole The Important And Secret Information. So The Mostly companies of the world should be
transferred to an application stage so because there is a less level of chances to hack the applications so
In Complete and finally we said that privacy of web applications are more important than other issues
Most businesses depend on the power of websites to interact with their customers and sell products.
Some technologies are often developed to take care of the different tasks of a website. Thus web
applications have been used increasingly to provide critical security services
Results
So final the result is that the web applications are more safe and reliable than web services on internet.
So it is our responsibility to use web application because web application were controlled by the owner
who gave protection to web application. So I would be said to author that you make tiny changes in
research article which is that the organization must start a campaign on start in web application over
web services. but in the other hand I also said that when you use web application keep in mind that
there are some application which are really a harmful for us. That these types of applications are made
by the author who is not officially recommended by play store. So that play store or a window do not
take responsibilities when the owner data stole or hack.
Conclusion
Cyber security concerns have increased rapidly in recent years and are raising serious doubts regarding
an emerging part of the global economy. Critical web applications quality cannot be separated from
security problems. In those all research articles I see the web security and frameworks and there
security problem. Security must be present in every critical web application as it is a quality measure
every user take as granted. Some well-defined frameworks, which integrate security with the SDLC,
were explained in this paper. Web applications are nowadays the gateway between people and
everyday operations with the entire world. This must be understood, and therefore, quality standards
must be raised, which from our point of view, it can only happen with the increase of security. Security
Reference
{ 1] V. B. Livshits and M. S. Lam, “Finding security vulnerabilities in java applications with static analysis.”
in Usenix Security, vol. 2013, 2005.
[2] M. Curphey and R. Arawo, “Web application security assessment tools,”
IEEE Security & Privacy, vol. 4, no. 4, pp. 32–41, 2006.
[3] Waleed Alrodhan, Identity management systems, Digital Identity and Access Management:
Technologies and Frameworks (2011) 209.
[4] Rohan Amin, Julie Ryan, Johan van Dorp, Detecting targeted malicious email, Security & Privacy, IEEE
10 (3) (2012) 64–71.
[5] A. Anitha, V. Vaidehi, Context based application level intrusion detection system, in: International
conference on Networking and Services, 2006,
ICNS’06, IEEE, 2006, p. 16.
[6] MARK CURPHEY ET AL.; A guide to building secure web applications; referenced
on 9.10.2002; 2002.
URL http://www.owasp.org/guide/
[7] CERT; Advisory ca-2000-02: malicious html tags embedded in client web requests;
referenced on 5.10.2002; 2000.
URL http://www.cert.org/advisories/CA-2000-02.html
[8] W. Stallings, Network security essentials: applications and standards.
Pearson Education India, 2007.
[9] T. Dierks, “The transport layer security (tls) protocol version 1.2,” 2008.
[10] S. McClure, J. Scambray, G. Kurtz, and Kurtz, Hacking exposed:
network security secrets and solutions. McGraw-Hill/Osborne New
York, 2005.
[11] Q. Inc. (2015) Ssl server rating guide. [Online]. Available: https:
//www.ssllabs.com/
[12] OWASP (2010a). OWASP Top 10 - 2010, The Ten Most Critical Web
Application Security Risks. OW ASP.
[13] OWASP (2010b). Owasp web site. http://www.owasp.org/. (Access
date: IS June 2011).
[14] OWASP (20 IOc). Software Assurance Maturity Model - A guide to
building security into software development - version 1.0. OWASP.
[ IS] OWASP (2011a). Owasp code review project.
http://www.owasp.orglindex.php/Category: OWASPCodeReviewPro
ject. (Access date: IS June 2011).
[16] OWASP (201Ib). Owasp live
http://www.owasp.orglindex.php/Category:
(Access date: IS June 20 I I).
cd project.
OW ASPLiveCDProject.
[17] OWASP (201Ic). Owasp threat risk modeling.
http://www.owasp.orglindex.php/ ThreatRiskModeling. (Access date: IS
June 2011).
[18] Simplex (2010). Simplex web-site. http://www.simplex.ptlindex.asp.
(Access date: IS June 2011).
[19] Striletchi, C. and Vaida, M.-F. (2003). Enhancing the secu- rity of web
applications. In Information Technology Interfaces, 2003. IT! 2003.
Proceedings of the 25th International Conference on, pages 463 - 468.
[20] Trifonov, G. (2009). Reducing the number of security vul- nerabilitiesin
web applications by improving software quality. In IEEE 5th
International Symposium on Applied Computational Intelligence and
Informatics, pages 51-54. IEEE.
Review Paper ( Research Articles )

More Related Content

What's hot

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
Symantec
 
10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuse
Entefy
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
Janagi Kannan
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
Entefy
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
Kim Jensen
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
Black Duck by Synopsys
 
Eliminating Security Uncertainty
Eliminating Security UncertaintyEliminating Security Uncertainty
Eliminating Security Uncertainty
Dell World
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
Veracode
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
SlideTeam
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Black Duck by Synopsys
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
Kevin Duffey
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Black Duck by Synopsys
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
Elastica Inc.
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
GFI Software
 
Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threats
Prakash Poudel
 

What's hot (19)

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuse
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Threat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates NewsThreat Check for Struts Released, Equifax Breach Dominates News
Threat Check for Struts Released, Equifax Breach Dominates News
 
Eliminating Security Uncertainty
Eliminating Security UncertaintyEliminating Security Uncertainty
Eliminating Security Uncertainty
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 VulnerabilityOpen Source Insight:  Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threats
 

Similar to Review Paper ( Research Articles )

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
SALU18
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
acijjournal
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET Journal
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
acijjournal
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedingsSTO STRATEGY
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
acijjournal
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
Project 3
Project 3Project 3
Project 3
Priyanka Goswami
 
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Editor IJMTER
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
Jeff Nelson
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
ijcnes
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
HK IT solutions... unlimited...
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
IJCSEA Journal
 

Similar to Review Paper ( Research Articles ) (20)

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Project 3
Project 3Project 3
Project 3
 
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 

More from SaadSaif6

Fourier transform (cell phones)
Fourier transform (cell phones)Fourier transform (cell phones)
Fourier transform (cell phones)
SaadSaif6
 
Correlation Coefficient
Correlation CoefficientCorrelation Coefficient
Correlation Coefficient
SaadSaif6
 
America-Iran Tensions ( Best & Easy Presentation )
America-Iran Tensions ( Best & Easy Presentation )America-Iran Tensions ( Best & Easy Presentation )
America-Iran Tensions ( Best & Easy Presentation )
SaadSaif6
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
SaadSaif6
 
Trapezoidal Rule
Trapezoidal RuleTrapezoidal Rule
Trapezoidal Rule
SaadSaif6
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
SaadSaif6
 

More from SaadSaif6 (6)

Fourier transform (cell phones)
Fourier transform (cell phones)Fourier transform (cell phones)
Fourier transform (cell phones)
 
Correlation Coefficient
Correlation CoefficientCorrelation Coefficient
Correlation Coefficient
 
America-Iran Tensions ( Best & Easy Presentation )
America-Iran Tensions ( Best & Easy Presentation )America-Iran Tensions ( Best & Easy Presentation )
America-Iran Tensions ( Best & Easy Presentation )
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
 
Trapezoidal Rule
Trapezoidal RuleTrapezoidal Rule
Trapezoidal Rule
 
Network Topology And Its Types
Network Topology And Its TypesNetwork Topology And Its Types
Network Topology And Its Types
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Review Paper ( Research Articles )

  • 1. Review Paper Author Abdul Razzaq ⇑, Khalid Latif, H. Farooq Ahmad, Ali Hur, Zahid Anwar, Peter Charles Bloods worth School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan Nuno Theodoro , ISCTE-IUL School of Technology and Architecture, ISCTE-IUL Lisbon University Institute Carlos Serrao, ISCTE-IUL School of Technology and Architecture ISCTE-IUL Lisbon University Institute Ye Zhu, Electrical and Computer Engineering Department, Cleveland State University, Cleveland, OH, USA Abstract we will outline the major security vulnerabilities found in modern web applications. We will then present and evaluate several tools available for assessing web application. Security and for unveiling the presence of these vulnerabilities. Some of the tools assessed the security of a whole site comprehensively while others were created for a more specific task. Providing Web Application Security for an organization that engages in electronic business is a huge and complex task. The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Introduction In This Topic We Discussed On Web Applications Security And To Protect Ourselves From Harmful Activities And Hackers. Because In This World We Have A Lot Of Issues To Face. Because The World Transfer The Old Generation To A Next Generation So That Is Why Our Data Would Be Unsafe Because To Much Load/Data On Internet. So There Is A lot Of Organization In The World Who Work For The Privacy Of There own Companies And There Employees Because Of Hackers And harmful Traffic In Internet Which Disturb The Data of The Organizations And May Case To Hack The Complete Website And Stole The Important And Secret Information. So The Mostly companies of the world should be transferred to an application stage so because there is a less level of chances to hack the applications so In Complete and finally we said that privacy of web applications are more important than other issues Most businesses depend on the power of websites to interact with their customers and sell products.
  • 2. Some technologies are often developed to take care of the different tasks of a website. Thus web applications have been used increasingly to provide critical security services Results So final the result is that the web applications are more safe and reliable than web services on internet. So it is our responsibility to use web application because web application were controlled by the owner who gave protection to web application. So I would be said to author that you make tiny changes in research article which is that the organization must start a campaign on start in web application over web services. but in the other hand I also said that when you use web application keep in mind that there are some application which are really a harmful for us. That these types of applications are made by the author who is not officially recommended by play store. So that play store or a window do not take responsibilities when the owner data stole or hack. Conclusion Cyber security concerns have increased rapidly in recent years and are raising serious doubts regarding an emerging part of the global economy. Critical web applications quality cannot be separated from security problems. In those all research articles I see the web security and frameworks and there security problem. Security must be present in every critical web application as it is a quality measure every user take as granted. Some well-defined frameworks, which integrate security with the SDLC, were explained in this paper. Web applications are nowadays the gateway between people and everyday operations with the entire world. This must be understood, and therefore, quality standards must be raised, which from our point of view, it can only happen with the increase of security. Security Reference { 1] V. B. Livshits and M. S. Lam, “Finding security vulnerabilities in java applications with static analysis.” in Usenix Security, vol. 2013, 2005. [2] M. Curphey and R. Arawo, “Web application security assessment tools,” IEEE Security & Privacy, vol. 4, no. 4, pp. 32–41, 2006. [3] Waleed Alrodhan, Identity management systems, Digital Identity and Access Management: Technologies and Frameworks (2011) 209. [4] Rohan Amin, Julie Ryan, Johan van Dorp, Detecting targeted malicious email, Security & Privacy, IEEE 10 (3) (2012) 64–71. [5] A. Anitha, V. Vaidehi, Context based application level intrusion detection system, in: International conference on Networking and Services, 2006, ICNS’06, IEEE, 2006, p. 16.
  • 3. [6] MARK CURPHEY ET AL.; A guide to building secure web applications; referenced on 9.10.2002; 2002. URL http://www.owasp.org/guide/ [7] CERT; Advisory ca-2000-02: malicious html tags embedded in client web requests; referenced on 5.10.2002; 2000. URL http://www.cert.org/advisories/CA-2000-02.html [8] W. Stallings, Network security essentials: applications and standards. Pearson Education India, 2007. [9] T. Dierks, “The transport layer security (tls) protocol version 1.2,” 2008. [10] S. McClure, J. Scambray, G. Kurtz, and Kurtz, Hacking exposed: network security secrets and solutions. McGraw-Hill/Osborne New York, 2005. [11] Q. Inc. (2015) Ssl server rating guide. [Online]. Available: https: //www.ssllabs.com/ [12] OWASP (2010a). OWASP Top 10 - 2010, The Ten Most Critical Web Application Security Risks. OW ASP. [13] OWASP (2010b). Owasp web site. http://www.owasp.org/. (Access date: IS June 2011). [14] OWASP (20 IOc). Software Assurance Maturity Model - A guide to building security into software development - version 1.0. OWASP. [ IS] OWASP (2011a). Owasp code review project. http://www.owasp.orglindex.php/Category: OWASPCodeReviewPro ject. (Access date: IS June 2011). [16] OWASP (201Ib). Owasp live http://www.owasp.orglindex.php/Category:
  • 4. (Access date: IS June 20 I I). cd project. OW ASPLiveCDProject. [17] OWASP (201Ic). Owasp threat risk modeling. http://www.owasp.orglindex.php/ ThreatRiskModeling. (Access date: IS June 2011). [18] Simplex (2010). Simplex web-site. http://www.simplex.ptlindex.asp. (Access date: IS June 2011). [19] Striletchi, C. and Vaida, M.-F. (2003). Enhancing the secu- rity of web applications. In Information Technology Interfaces, 2003. IT! 2003. Proceedings of the 25th International Conference on, pages 463 - 468. [20] Trifonov, G. (2009). Reducing the number of security vul- nerabilitiesin web applications by improving software quality. In IEEE 5th International Symposium on Applied Computational Intelligence and Informatics, pages 51-54. IEEE.