WEB APPLICATION PROTECTION TECHNOLOGIES

The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites f...

Full description

Bibliographic Details
Main Authors: Volodymyr Pevnev, Oksana Popovichenko, Yaroslav Tsokota
Format: Article
Language:English
Published: National Technical University "Kharkiv Polytechnic Institute" 2020-03-01
Series:Сучасні інформаційні системи
Subjects:
Online Access:http://ais.khpi.edu.ua/article/view/198547
id doaj-b3e11bf5525b4563834bf166b2031a6f
record_format Article
spelling doaj-b3e11bf5525b4563834bf166b2031a6f2021-05-26T21:17:04ZengNational Technical University "Kharkiv Polytechnic Institute"Сучасні інформаційні системи2522-90522020-03-014110.20998/2522-9052.2020.1.18WEB APPLICATION PROTECTION TECHNOLOGIESVolodymyr Pevnev0Oksana Popovichenko1Yaroslav Tsokota2National Aerospace University “Kharkiv Aviation Institute”, KharkivNational Aerospace University “Kharkiv Aviation Institute”, KharkivNational Aerospace University “Kharkiv Aviation Institute”, Kharkiv The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites for cyber-attacks; considered the most common types of vulnerabilities; suggest ways to create a secure application. The methods used are: analytical method, literature analysis, description. The following results were obtained: For each given type of vulnerability, a scenario of a possible attack by an attacker was considered. There were also suggested ways for developers to use these vulnerabilities and develop a secure web application. Conclusions. Keep in mind that the best protection for web applications is writing safe code. Developers who implement applications should be aware in advance of the existence of common types of attacks and how they work in order to protect applications and prevent possible cyber-attacks. It is best to use security methods comprehensively to protect your web application as much as possible. http://ais.khpi.edu.ua/article/view/198547web applicationvulnerabilityattackweb applications protectionsecure application
collection DOAJ
language English
format Article
sources DOAJ
author Volodymyr Pevnev
Oksana Popovichenko
Yaroslav Tsokota
spellingShingle Volodymyr Pevnev
Oksana Popovichenko
Yaroslav Tsokota
WEB APPLICATION PROTECTION TECHNOLOGIES
Сучасні інформаційні системи
web application
vulnerability
attack
web applications protection
secure application
author_facet Volodymyr Pevnev
Oksana Popovichenko
Yaroslav Tsokota
author_sort Volodymyr Pevnev
title WEB APPLICATION PROTECTION TECHNOLOGIES
title_short WEB APPLICATION PROTECTION TECHNOLOGIES
title_full WEB APPLICATION PROTECTION TECHNOLOGIES
title_fullStr WEB APPLICATION PROTECTION TECHNOLOGIES
title_full_unstemmed WEB APPLICATION PROTECTION TECHNOLOGIES
title_sort web application protection technologies
publisher National Technical University "Kharkiv Polytechnic Institute"
series Сучасні інформаційні системи
issn 2522-9052
publishDate 2020-03-01
description The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites for cyber-attacks; considered the most common types of vulnerabilities; suggest ways to create a secure application. The methods used are: analytical method, literature analysis, description. The following results were obtained: For each given type of vulnerability, a scenario of a possible attack by an attacker was considered. There were also suggested ways for developers to use these vulnerabilities and develop a secure web application. Conclusions. Keep in mind that the best protection for web applications is writing safe code. Developers who implement applications should be aware in advance of the existence of common types of attacks and how they work in order to protect applications and prevent possible cyber-attacks. It is best to use security methods comprehensively to protect your web application as much as possible.
topic web application
vulnerability
attack
web applications protection
secure application
url http://ais.khpi.edu.ua/article/view/198547
work_keys_str_mv AT volodymyrpevnev webapplicationprotectiontechnologies
AT oksanapopovichenko webapplicationprotectiontechnologies
AT yaroslavtsokota webapplicationprotectiontechnologies
_version_ 1721426125451689984