Skip to Content

Instrukcja korzystania z Biblioteki

Serwisy:

Ukryty Internet | Wyszukiwarki specjalistyczne tekstów i źródeł naukowych | Translatory online | Encyklopedie i słowniki online

Translator:

Kosmos
Astronomia Astrofizyka
Inne

Kultura
Sztuka dawna i współczesna, muzea i kolekcje

Metoda
Metodologia nauk, Matematyka, Filozofia, Miary i wagi, Pomiary

Materia
Substancje, reakcje, energia
Fizyka, chemia i inżynieria materiałowa

Człowiek
Antropologia kulturowa Socjologia Psychologia Zdrowie i medycyna

Wizje
Przewidywania Kosmologia Religie Ideologia Polityka

Ziemia
Geologia, geofizyka, geochemia, środowisko przyrodnicze

Życie
Biologia, biologia molekularna i genetyka

Cyberprzestrzeń
Technologia cyberprzestrzeni, cyberkultura, media i komunikacja

Działalność
Wiadomości | Gospodarka, biznes, zarządzanie, ekonomia

Technologie
Budownictwo, energetyka, transport, wytwarzanie, technologie informacyjne

Input Validation Vulnerabilities in Web Applications

With the growth of internet, web applications have become very popular and used in every environment like medical, financial and military. But in the race to develop these online services, web applications have been developed and deployed with minimal attention given to security risks which leads to vulnerabilities in web application. Developers are mandated to deliver functionality on time and on budget but not to develop secure web applications, resulting in development of vulnerable web applications. Removing vulnerabilities after development wastes cost as well as time. So, why not Security is implemented throughout software development lifecycle it will save time and cost. Thousands of vulnerabilities are there in existing web application but this study focused on input validation vulnerabilities i.e., SQL injection and Cross Site Scripting (XSS), as they are more prevalent and have high risk. A brief introduction of web application vulnerabilities is discussed in this study. How cross site scripting and SQL injection vulnerabilities are addressed throughout the software development lifecycle is discussed. Different activities to be performed to mitigate them are suggested.

Journal of Software Engineering 2014/04/14 - 09:14 Czytaj