13 Oct Preventing attack on web application
below are the project proposal details description and with this can you prepare final project with PPT.
Preventing attack on web application
Introduction
Web application exists on the webserver. Any approved user can join it through a password. Web applications contain three layers which include a web browser, content generation technology, and company database. There are security loopholes in the web application that are being exploited by hackers. In 2000, the first attack was carried out by a Norwegian teenager who was 17 years old. When he was making an online transaction, he realized that the URLs of all the web pages he opened showed his bank account information. Prokhorenko said, “He replaced his bank account information with another person’s bank account number in order to generate the customer’s personal data,” (Prokhorenko, et al., 2016). In 2001, Acme Art website was attacked, and credit card information was displayed and extracted.
The company lost hundreds and thousands of funds. Customers withdrew their orders. Website defacement is a problem that results from a web application attack. Attackers know how to adjust the source code of many web applications. In 2004 the “Santy” worm entered web servers leading to the defacing of 40,000 websites in one day. Organizations face a number of legal implications from web application attack. For example, Victoria Secret, which is a lingerie manufacturing company, was sued when details about the purchases of the customer, were available in the database. The company was fined $50,000 to New York. Higbee said, “Hackers have come up with a large variety of attack mechanism, and they have to choose the one that suits a certain vulnerability,” (Higbee, et al., 2016).
Attackers have a strategic plan. They first analyse the properties of the server. The type of server and the operating system that runs on the server. A port scan is then carried out to determine the open HTTP ports to determine the most appropriate port to attack. The attacker then looks for loopholes that can be exploited. Moreover, the hacker accesses the authentication and login process. Laxity in input validation is the main pathway that attackers or hackers use. If they manage to outsmart the input validation checkpoint, then they are able to send dangerous inputs to the server. The last step is for the hacker to mount the attack. Hackers favourite mode attack is SQL injection. This happens when the attacker conveys SQL query command to the server via the web application. The cross-site occurs when an attacker inserts malicious data into the webpage.
Conclusion
Directory traversal attack occurs when an application is deployed to permit entrance to other sources on the server or access to files that are not normally accessible. Compagna said, “Authentication attack occurs when the hacker finds a way to enter the server from a web application,” (Compagna, et al., 2017). This topic is important since the attacks are increasing at a fast pace. Research shows that the quantity of successful web application attacks is increasing from 60% in 2016 to 80% in 2018. If the rate of web application infringement continues to raise, this means that clients will lack confidence in e-commerce. It is therefore important to learn about the preventive measure to reduce the quantity of loses that occur yearly due to web application attack.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.