Secure Development - Web Application Security.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 6
Abstract
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to attacks such as SQL injection and cross-site scripting. This paper also list out the different categories of vulnerability with the small examples along with prevention guidance and a sample of research by different vendors about the State of Software Security Report and Web Application Vulnerability Statistics of 2012. This paper reviews need of secure development, resource s available for creating secure Web applications. These resources ranges from the security features of the development, to automated tools evaluating an existing Web application, to Web sites dedicated to all facets of Web application security. In Web application security, making one single mistake can lead to many unwanted flaws. By using the different resources available, the risk of the applications to be vulnerable can be reduced to an acceptable level. In addition, some risk can be avoided at the very beginning of the project life cycle when the requirements for the system are defined.
Authors and Affiliations
Sayyad Arif Ulla
Security Issues and Privacy in Cloud Computing
Abstract: Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a...
Tuning of Extended Kalman Filter for nonlinear State Estimation
Abstract: Kalman Filter is the most popular method for state estimation when the system is linear. State estimation is the typical issue in every part of engineering and science. But, for non linear systems, different ex...
Application Newton methods in the reduction of the problem of optimal control of a boundary value problem.
The article presents a generalized continuation of the parameter and Newton methods for solving nonlinear equations . It describes and explores one approach to the application of the continuation method for solving...
Customer Relationship Management Using Clustering And Classification Technique
CRM (Customer Relationship Management) is a method and tool that helps organizations to maintain customer relationships in a structured manner. It can help to choose the right people or decide on new products that their...
Importance of Selecting Test Cases for Regression Testing
Abstract: There is a well-known discussion stating that “Under Testing is a crime and over testing is a Sin”. Regression testing also faces the same challenge regarding the selection of test cases which needs to re...