Please use this identifier to cite or link to this item: http://192.168.9.248:8080/jspui/handle/123456789/809
Title: Advances in Cyberology and the Advent of the Next-Gen Information Revolution
Authors: Husain, Mohd Shahid ed.
Faisal, Mohammad ed.
Sadia, Halima ed.
Ahmad, Tasneem ed.
Shukla, Saurabh ed.
Keywords: Computer Application
Cyber Security
Issue Date: 2023
Publisher: IGI Global
Abstract: Large-scale deployments of web applications occur continuously. The failure to validate or sanitize form inputs, improperly configured web servers, and application design flaws are the main causes of security vulnerabilities that continue to infect web applications, allowing hackers to access sensitive data and using legitimate websites as a breeding ground for malware. These vulnerabilities can be used to compromise the security of the application. The largest problem that enterprises face is how to create a web application that satisfies their needs for safe processes, E-Commerce, and the transmission of sensitive data. OWASP updates and releases a list of the top 10 web application vulnerabilities every few years. Along with the OWASP Top 10 Threats, this chapter also discusses each vulnerability's possible effects and how to avoid them. According to the OWSP (Open Online Application Security Project) Top Ten, this document analyses the most serious web vulnerabilities, their causes, and their impacts.
Description: CHAPTER 2 : The Critical Analysis of E-Commerce Web Application Vulnerabilities by Gausiya Yasmeen, Syed Adnan Afaq
URI: 10.4018/978-1-6684-8133-2.ch002
http://192.168.9.248:8080/jspui/handle/123456789/809
Appears in Collections:Books/Book Chapters/Edited Books

Files in This Item:
File Description SizeFormat 
BOOK CHPATER 2 2023-2024 CA.pdfIGI350 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.