Please use this identifier to cite or link to this item:
http://192.168.9.248:8080/jspui/handle/123456789/809
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Husain, Mohd Shahid ed. | - |
dc.contributor.author | Faisal, Mohammad ed. | - |
dc.contributor.author | Sadia, Halima ed. | - |
dc.contributor.author | Ahmad, Tasneem ed. | - |
dc.contributor.author | Shukla, Saurabh ed. | - |
dc.date.accessioned | 2024-01-18T04:47:20Z | - |
dc.date.available | 2024-01-18T04:47:20Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | 10.4018/978-1-6684-8133-2.ch002 | - |
dc.identifier.uri | http://192.168.9.248:8080/jspui/handle/123456789/809 | - |
dc.description | CHAPTER 2 : The Critical Analysis of E-Commerce Web Application Vulnerabilities by Gausiya Yasmeen, Syed Adnan Afaq | en_US |
dc.description.abstract | Large-scale deployments of web applications occur continuously. The failure to validate or sanitize form inputs, improperly configured web servers, and application design flaws are the main causes of security vulnerabilities that continue to infect web applications, allowing hackers to access sensitive data and using legitimate websites as a breeding ground for malware. These vulnerabilities can be used to compromise the security of the application. The largest problem that enterprises face is how to create a web application that satisfies their needs for safe processes, E-Commerce, and the transmission of sensitive data. OWASP updates and releases a list of the top 10 web application vulnerabilities every few years. Along with the OWASP Top 10 Threats, this chapter also discusses each vulnerability's possible effects and how to avoid them. According to the OWSP (Open Online Application Security Project) Top Ten, this document analyses the most serious web vulnerabilities, their causes, and their impacts. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IGI Global | en_US |
dc.subject | Computer Application | en_US |
dc.subject | Cyber Security | en_US |
dc.title | Advances in Cyberology and the Advent of the Next-Gen Information Revolution | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Books/Book Chapters/Edited Books |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
BOOK CHPATER 2 2023-2024 CA.pdf | IGI | 350 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.