WEB APPLICATION PROTECTION TECHNOLOGIES
The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites f...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
National Technical University "Kharkiv Polytechnic Institute"
2020-03-01
|
Series: | Сучасні інформаційні системи |
Subjects: | |
Online Access: | http://ais.khpi.edu.ua/article/view/198547 |
id |
doaj-b3e11bf5525b4563834bf166b2031a6f |
---|---|
record_format |
Article |
spelling |
doaj-b3e11bf5525b4563834bf166b2031a6f2021-05-26T21:17:04ZengNational Technical University "Kharkiv Polytechnic Institute"Сучасні інформаційні системи2522-90522020-03-014110.20998/2522-9052.2020.1.18WEB APPLICATION PROTECTION TECHNOLOGIESVolodymyr Pevnev0Oksana Popovichenko1Yaroslav Tsokota2National Aerospace University “Kharkiv Aviation Institute”, KharkivNational Aerospace University “Kharkiv Aviation Institute”, KharkivNational Aerospace University “Kharkiv Aviation Institute”, Kharkiv The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites for cyber-attacks; considered the most common types of vulnerabilities; suggest ways to create a secure application. The methods used are: analytical method, literature analysis, description. The following results were obtained: For each given type of vulnerability, a scenario of a possible attack by an attacker was considered. There were also suggested ways for developers to use these vulnerabilities and develop a secure web application. Conclusions. Keep in mind that the best protection for web applications is writing safe code. Developers who implement applications should be aware in advance of the existence of common types of attacks and how they work in order to protect applications and prevent possible cyber-attacks. It is best to use security methods comprehensively to protect your web application as much as possible. http://ais.khpi.edu.ua/article/view/198547web applicationvulnerabilityattackweb applications protectionsecure application |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Volodymyr Pevnev Oksana Popovichenko Yaroslav Tsokota |
spellingShingle |
Volodymyr Pevnev Oksana Popovichenko Yaroslav Tsokota WEB APPLICATION PROTECTION TECHNOLOGIES Сучасні інформаційні системи web application vulnerability attack web applications protection secure application |
author_facet |
Volodymyr Pevnev Oksana Popovichenko Yaroslav Tsokota |
author_sort |
Volodymyr Pevnev |
title |
WEB APPLICATION PROTECTION TECHNOLOGIES |
title_short |
WEB APPLICATION PROTECTION TECHNOLOGIES |
title_full |
WEB APPLICATION PROTECTION TECHNOLOGIES |
title_fullStr |
WEB APPLICATION PROTECTION TECHNOLOGIES |
title_full_unstemmed |
WEB APPLICATION PROTECTION TECHNOLOGIES |
title_sort |
web application protection technologies |
publisher |
National Technical University "Kharkiv Polytechnic Institute" |
series |
Сучасні інформаційні системи |
issn |
2522-9052 |
publishDate |
2020-03-01 |
description |
The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites for cyber-attacks; considered the most common types of vulnerabilities; suggest ways to create a secure application. The methods used are: analytical method, literature analysis, description. The following results were obtained: For each given type of vulnerability, a scenario of a possible attack by an attacker was considered. There were also suggested ways for developers to use these vulnerabilities and develop a secure web application. Conclusions. Keep in mind that the best protection for web applications is writing safe code. Developers who implement applications should be aware in advance of the existence of common types of attacks and how they work in order to protect applications and prevent possible cyber-attacks. It is best to use security methods comprehensively to protect your web application as much as possible.
|
topic |
web application vulnerability attack web applications protection secure application |
url |
http://ais.khpi.edu.ua/article/view/198547 |
work_keys_str_mv |
AT volodymyrpevnev webapplicationprotectiontechnologies AT oksanapopovichenko webapplicationprotectiontechnologies AT yaroslavtsokota webapplicationprotectiontechnologies |
_version_ |
1721426125451689984 |