WEB ATTACKS AND DEFENSES

Section: Review Paper
Published
Jun 1, 2023
Pages
114-127

Abstract

Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications.

Download this PDF file

Statistics

How to Cite

[1]
A. A. Alobaidi, عمار, N. B. Al Dabbagh, and نجلاء, “WEB ATTACKS AND DEFENSES”, EDUSJ, vol. 32, no. 2, pp. 114–127, Jun. 2023.