preview

Web Application Of Web Applications

Good Essays

WEB APPLICATION SECURITY

Table of Contents
Introduction to Web Application………………………………………………………………....04
Web Application Attacks…………………………………………………………………………04
Common Application Attacks……………………………………………………………………05
Injection Vulnerability…………………………………………………………………………...06
Cross-Site Scripting……………………………………………………………………………...07
Broken Authentication and Session Management……………………………………………….07
Conclusion……………………………………………………………………………………….08

List of Tables and Figures
Web Application Exposed Structure.…………………………………………………………....05
Example of SQL injection.………………………………………………………………………06 WEB APPLICATION SECURITY Introduction to Web Application
Web Application is …show more content…

Web Application Attacks
Now a day, data sharing over web based application has greatly increased which is technically good. Also application attacks were increased which is very risky as the issue related to confidentiality, integrity, availability which results in data theft.
According to John Desmond, there are many dangerous application attacks which provides the access for end user to view system resources and private information’s by breaking the network firewalls (John Desmond, 2004).
In this paper, I would like discuss the few top vulnerabilities to web application as per the recent survey of Open Web Application Security Project (OWASP). Here the goal is to learn and discuss some of the top vulnerabilities effect and how to prevent those attack.
Application development is done more and more on the web. We are using web browser for accessing the application, here it uses Hyper Text Transfer Protocol(HTTP) to communicate with the network. As application layer is the top layer in OSI it is easily accessible from outside world and which may sometimes result in data theft or loss.

Fig.1: Web Application Exposed Structure (Source: Security Intelligence, Paul-2015)

Common Application Attacks
Goal of this research paper is to educate and informing about the common and top vulnerabilities to the web application by referring the latest survey of Open Web Application Security Project (OWASP) on

Get Access