Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer: Vulnerabilities of Web Applications: Good Practices and New Trends.

Title:
Vulnerabilities of Web Applications: Good Practices and New Trends.
Source:
Applied Cybersecurity & Internet Governance (ACIG); 2024, Vol. 3 Issue 2, p122-143, 22p
Database:
Complementary Index

Weitere Informationen

Web application security remains a critical challenge in mitigating vulnerabilities that expose sensitive data and systems to cyberattacks. This paper addresses the recent trends in the vulnerability of web applications to cyberattacks. It explores implementing and evaluating security mechanisms in web services guided by the Open Web Application Security Project's (OWASP) Top 10 framework. The OWASP analyser - a test application prepared to simulate the broken access control, Structured Query Language (SQL) Injection, and cross-site scripting (XSS) attacks - was executed in three realistic scenarios: web applications without any protection mechanism, essential safeguards, and advanced measures. The experimental results demonstrate the effectiveness of layered security strategies and highlight the best practices, such as rolebased access control, secure cryptographic methods, and comprehensive logging. The analysis highlights the need to embed security throughout Web applications' implementation and use cycle. While advanced measures, such as encryption and real-time monitoring, increase resilience to sophisticated attacks, even basic practices can provide significant application protection if applied consistently. [ABSTRACT FROM AUTHOR]

Copyright of Applied Cybersecurity & Internet Governance (ACIG) is the property of NASK: National Research Institute and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)