preview

Web Applications : The Cyber Security Risks That Exploit The Vulnerabilities That Lies With It

Good Essays

Over the past decade, web development has been a growing industry especially by businesses actively selling their products and services to online customers. In tandem with the growing popularity of web applications are the cyber security risks that exploit the vulnerabilities that lies with it. These web applications must be available 24/7 to provide the required service to customers, employees and other stakeholders. Most web applications like canvazify.com cannot be protected by firewalls and SSL as the access needs to be publically available and this makes it easy for attackers to directly access the database effectively bypassing the security mechanisms by the operating system thereby constituting a major vulnerability. Like many web …show more content…

The potential technical risks that Canvazify.com faces as per OWASP’s (Open Web Application Security Project) list of top threats that can lead to service disruptions or data theft are as discussed below:
• Denial of Service Attacks: Denial of service attacks are very common on the internet. These are attacks that deny authorized access to a system, network, web application or information.
• Injection Attacks: The attackers are able to relay malicious code through the web application to systems such as back end databases or operating system by identifying injection flaws in the web application.

• Cross-Site Scripting: These attacks are a type of injection issue that is a result of malicious scripts being injected into legitimate web applications. These attacks can lead to the user of the web application being fooled into providing their data to the attacker.

• Insecure Direct Object Reference: As no secure coding practices were followed by the web application developers at Canvazify.com , the likelihood of the developer having exposed a reference to an internal implementation object , like a file or directory, as a URL or form parameter is high. These object references can be manipulated directly by the attacker to access other objects without authorization.

• Broken authentication and session management: It is often seen that application functions related

Get Access