Web Application Attack and Countermeasure |
Author(s): |
Pawar Puja Uday , Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai; Soni Varun, Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai; Lakshane Pooja, Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai; Prof. Sulakshana Mane, Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai |
Keywords: |
Web Application Attacks, Injection Attack agents, OWASP |
Abstract |
Adoption of internet for business operations has changed the face of business interactions in business 2 business (B2B), business 2 consumer (B2C) or now popular consumer 2 consumer (C2C) models. Applications are built to adapt this changing business perspective and thereby giving more and more control to the end user/consumer to define the way they want to make the business happen. But as we say, each coin has two sides, with flexibility there comes a great responsibility of maintaining the sanity of the information, which these applications access and publish on the internet. The thought of increase of cyber terrorism and espionage incidents has triggered a worldwide uncertainty of ever increasing dependency of internet as a business medium. This paper hereby attempts to address these problems by taking references from the well-known attack vectors and thereby providing counter measures to identify, analyze and mitigate the problem. This paper primarily takes the reference from Open Web Application Security Project (OWASP) guidelines. |
Other Details |
Paper ID: IJSRDV2I12076 Published in: Volume : 2, Issue : 12 Publication Date: 01/03/2015 Page(s): 67-68 |
Article Preview |
|
|