Premium Essay

Web Application

In: Computers and Technology

Submitted By shubada
Words 6435
Pages 26
Chapter – 1
INTRODUCTION

The world as we know it today is centered on the workings and ability of the World Wide Web. Internet security, however, is one area of concern and poses one of the biggest challenges to this internet savvy era. Our interaction with the internet has increased to such an extent , that experience, mixed with continued research has taught us that with each such interaction, we are prone to many malicious attacks, security lapses and even extremely skilled hacking operations. The field of Network Security and Cryptography has come a long way in the past decade, but it is safe to say that there is a lot more work to be done.

Here we choose to concentrate on Web Applications and we particularly approach them from the developer’s perspective. With every step taken towards better security on the internet, end-users are doing their bit to safeguard their systems and data. However, keeping in mind how commercial and competitive the world we live in has become and the manner in which the market for web related products has grown, it becomes imperative for a developer to ensure that his web application is not just marketable as a breakthrough user friendly concept but also as a secure one. We imagine a world where, every skilled developer is able to make phenomenal applications and is able to provide his users with a large amount of credibility and reliability in terms of security.

We aim to conceptualize and subsequently generate a security tool exclusively for the developer, which will be able to scan his work for security lapses and loopholes thereby enhancing the product testing process and making it more wholesome and complete.

Chapter – 2
PROBLEM DEFINITION

Our project aims at designing an application that has the following features:

1. Identify a selected set of software security vulnerabilities like Cross Site...

Similar Documents

Premium Essay

Web Application

...Web Application CIS/207 Web Application Since its inception for public use, the internet has grown to an enormous size. According to the United States Census close to 80 percent of individuals over 15 years of age are connected to the internet (US Census, 2012). 8 out of 10 people are using smart phone technology or have some type of connected device that allows them to update or browse online media. One of the popular web applications hot in the market today is social media. From the world of blogging came a medium that allows people to maintain constant to-the-second updates on the world around them. The top three examples of social media applications are Facebook, Twitter, and Pinterest. Facebook is leading this market with three times the monthly traffic compared to its competitors (eBiz, 2014). Facebook Facebook was established at Harvard University by Mark Zuckerberg in 2004 as a college campus social blogging site. Zuckerberg hacked the university website to obtain pictures of students and posted them on his website for users to view and make comments. This evolved into a social web application that spread to universities all over the United States. He reorganized and recoded the application into what is known today as Facebook. Facebook is a web application that allows users to sign up for a personal profile page. Users can communicate with other users through private and public chat or postings....

Words: 774 - Pages: 4

Premium Essay

Web Applications

...The World Wide Web (WWW) has become the largest sources of information. However, its content cannot be manipulated in a general way because of two main issues: (1) Finding relevant information is a difficult task and (2) the web is unstructured. Search engines such as Altavista, Google, Lycos, and many others offer some form of structure and comfort to users, however, their query facilities are often limited and come in the form of HTML pages. Most of the information present on the web is stored in a HTML format. HTML is a semi-structured format designed to describe and create the layout of the web pages. HTML is not responsible for the content displayed. These factors have initiated a need and desire to develop data mining techniques. In this paper, I will address the problem of extracting data from the web and I will analyze some of the techniques to approach web mining. Web Applications A Web...

Words: 1045 - Pages: 5

Free Essay

Web Applications

...One dozen trusted Web Apps Web Apps are computer software applications which have right to use over the network like Internet and intranet. There are numerous web apps that are gaining popularity and are trusted by the users. These web apps provide compatibility to thousands of computer clients as it can be operated in any modern browser or mobile OS. 1. Money: Money is termed as another food to survive in this world. Monetary balance is very essential to manage business and personal life online. To deal with the finances, cash flows and to make the sites financially viable there are applications like: Mint: This application has found ways to administer the finances online in a convenient way. It will check the accounts and track your budgets. Freshbooks: This app provides an easier platform to raise online invoices for the clients within the time specified and also facilitate collection of payment through Paypal. . 2. Presentations: This is a kind of apps that is ruled by the phrase “First Impression is the last impression”. In this application one can present his idea, his thought, his believe visually and make the things in their favour. This kind of app is gaining popularity in corporate sector where everything needs to be discussed at various levels to get it executed and describing the idea again and again can sometimes lose its vision so presenting the thought through various presentation is the most suitable technique....

Words: 714 - Pages: 3

Premium Essay

Web Application

...Keywords: Requirements Engineering, Web methodology, survey Communicated by: (to be filled by the JWE editorial) 1 Introduction The intensive use of Web Applications has produced, among others, a rising interest in the development of methodological approaches providing a suitable support for the construction of Web applications. Several research groups proposed methodologies with processes, models and techniques to build such applications [33, 18, 31, 9] in the last...

Words: 8661 - Pages: 35

Premium Essay

Web Application

...CSC581: Advanced Software Engineering Web Application Architectures Manar Alqarni Abstract As the difficulty of web application grows, the need to develop an architecture for the web application is become necessary in order to support and guide an organization for web system planning, maintenance, deployment, building and design. This research paper presents an abstract view for web application architecture and it will be focused on the comparison of existing applications architecture. Moreover, it discusses the advantages and disadvantages of these architectural designs. Key words Web application, Architecture, Framework, MVC, Ajax, SOFEA. 1. Introduction The history of web application has begun when Tim Berners-Lee and his colleagues in 1989 were working together on their project for a distributed hypertext system, they did not have a clue of how the World Wide Web would look alike tomorrow [1]. While many of documents and accessible resources on the web were growing, also the different category of programming languages and technologies for web page generation increased. Additionally, the different category of programming languages and technologies caused a growth in the variety of possibilities and applications on the web [3]....

Words: 2759 - Pages: 12

Premium Essay

Web Application

...The Software Development Client has requested the creation of a Secure Web Application, which is a designed to guide your customers through the process of creating supply orders . The web application will be a web-based solution using the supported corporate Internet Explorer and Firefox browsers. It will be developed using ASP.Net MVC and Sql Server 2008. This is based on the superior performance, reliability and availability of qualified developers to support the application for the long run. Our ultimate deliverable goes beyond a well-tested production-ready software application. We also provide project specification, clear design documents, user / technical manuals, and a testing / development environment so that development can easily continue beyond the scope of this project. While our goal is a long-term relationship with Software Development Client, as professionals, we will produce a structure that can be maintained or extended by anyone familiar with .Net and Sql Server. We will establish specific deliverable timetables based on the Software Development Clients schedule and requirements. We are currently anticipating a two month project timeframe. Should you decide to move forward, we have three software development team members who would be ready to begin the project two weeks from the date of acceptance. I will personally act as Client Liaison / Project Manager and will be involved with your project on an on-going basis....

Words: 259 - Pages: 2

Premium Essay

Benefits of Web Application

...Table of Content Introduction | 1 | Analysis | 2,3,4,5,6 | Evaluation | 7, 8 | Recommendation and Conclusion | 9 | Appendices | 10 | References | 11 | Introduction Over the past 10 years, web application has moved to be a very powerful business tool in the organization. In effectively will swear by how essential it’s become. It was an exciting application which suddenly took the world by storm to such an extent that it became something that no business, small or large, local or global, could afford to ignore. With the advent of web application, this way of doing business has been extended to a much larger audience and it’s now more important than ever to use this market to advantage and to embrace the technology help to grow business. Software is defined by a program or a group of programs that is design for a user’s. The software could easily be divided by two parts. One would be the system software and another is the application software. Application software includes word processors, spreadsheets and power point. Next is the web application. Web application is an application where users could easily access via web. Web applications allow users to excess the web and exchange data and information between each other. Analysis Application Software is a programs designed for users to do different task by using various programs to make them more productive....

Words: 2160 - Pages: 9

Free Essay

Web Application Security

...Web Server Application Attacks Brooks Gunn Professor Nyeanchi CIS 502 July 10, 2013 Web Server Application Attacks Many organizations have begun to use web applications instead of client/server or distributed applications. These applications has provided organizations with better network performance, lower cost of ownership, thinner clients, and a way for any user to access the application. We applications significantly reduce the number of software programs that must be installed and maintained in end user workstations (Gregory 2010). Web applications are becoming a primary target for cyber criminals and hackers. They have become major targets because of the enormous amounts of data being shared through these applications and they are so often used to manage valuable information. Some criminals simply just want vandalize and cause harm to operations. There are several different types of web application attacks. Directory traversal, buffer overflows, and SQL injections are three of the more common attacks. One of the most common attacks on web based applications is directory traversal. This attack’s main purpose is the have an application access a computer file that is not intended to be accessible. It is a form of HTTP exploit in which the hacker will use the software on a Web server to access data in a directory other than the server’s root directory....

Words: 1620 - Pages: 7

Premium Essay

Web Application Security

...Assignment 7 You may search these terms from the web resource links available under Resources to expand on the terminology and/or usage. If you do so, you must provide the reference to the resource as well as cite in your answer with (author, year, and page or paragraph number(s). 1. Create a Word document and name it CS680-Assignment_7_FirstName_LastName.doc(x) (with your name substituted for first name and last name). 2. Part I: put questions in the above file with their respective question numbers and answers, for the following: • From the SINN book – Chapter 7, Review Questions 2 to 22 even p. 292 • From the GREMB book -- Chapter 10, Review Questions 2 to 20 even pp. 275-277 3. Part II: visit the following three sites: • http://www.ieee.org • http://www.PMI.org • http://www.webappsec.org For Each of the three sides find three societies or special interest groups that deal with security, application security, or Web application security. Write a synopsis of what the organization does, and how the society or special interest group can help you become more successful Web developer when it comes to implementing security into your software design. This question must be answered with at least 60 words each part with proper citations, proper references, and formatting. Combine the answers into the same above file. From the SINN book – Chapter 7, Review Questions 2 to 22 even p. 292 2. _____________ is concerned with what an identity is allowed to do....

Words: 2041 - Pages: 9

Premium Essay

Web or Mobile Application

...Web or Mobile Application Paper Connie Santos CIS319 June 17, 2013 Robert Juszynski Web or Mobile Application Paper JP Morgan Chase Mobile Bank application is one of the most important applications I have in my iPhone. Chase has created a new way of banking with their application. It is user friendly, it offers amazing capabilities, it is a time and money saver, and it has room for improvement. Chase has brought banking into our hands. The purpose of the application is to make banking for their customers stress-free. With this application customers can deposit checks from their iPhone, iPad, iPod touch, Android, Kindle Fire, and Windows Phone. All they do is input the amount of the check, take a front and back picture of the check and click submit. Customers can also view their banking and credit card balances and transaction history. Customers can transfer money between Chase and non-Chase accounts, in different ways. They offer Transfer Money, Wire Transfer, and Chase QuickPay. I just used the QuickPay feature today. My little sister bought my tickets to Lollapalooza so I paid her back through QuickPay. In order for the money to get deposit to her account, we both have to enrolled in the Person-to-Person QuickPay. Once we both signed up, I type her e-mail or phone number and the amount to transfer and submit it. Once sent, she approves the transaction, and it is complete. I am also able to pay bills with the application....

Words: 787 - Pages: 4

Premium Essay

Web Application Firewalls

...The primary WAF benefit is providing protection for custom Web applications that would otherwise go unprotected by other technologies that guard only against known exploits and prevent vulnerabilities in off-the-shelf Web application software...

Words: 10448 - Pages: 42

Free Essay

Introduction to Web Applications

...Base 16 numbering system: _________ ©ITT Educational Services, Inc. 25 Date: 05/20/2010 Introduction to Web Applications Unit 3 19. CSS property that can configure italics: _________ 20. CSS property that configures the boldness of the text: _________ 21. CSS property that configures the size of the text: _________ Submit your written answers to your instructor at the start of the next unit. ©ITT Educational Services, Inc. 26 Date: 05/20/2010...

Words: 302 - Pages: 2

Free Essay

Web or Mobile Application

...Instagram has proved to be the top photo sharing application on mobile devices, and there have been many others that have tried to tap into that category. One mobile application that has successfully made its own foot print in the photo social media category is Foap. It is a web and mobile application combination where you can upload photos that you take with your phone to post and have the chance for someone, or a company to purchase your photos. It is used by anybody from the casual teenager taking selfies to the dedicated professional photographer to post their favorite photos throughout their day. Users compete in competitions, known as missions, posted by companies in need of category specific photos for big cash prizes. Users have the capability to vote on photos based on a 0 through 5 star rating and also be able to purchase any photo on the application or website for $5 with exclusive rights. Companies or people in the business of buying/selling photos also have the option to buy credit packages where they can gain discounts on mass amounts of photos. In recent updates, Foap developers have brought new user interface features, along with advanced sharing options to a lot of the mainstream social media platforms. The application has also integrated a newsfeed tab, showing the activity of the community and on your profile....

Words: 663 - Pages: 3

Free Essay

Security for Web Applications

...RECENT CYBER ATTACKS SANDEEP VEMULAPALLI 12917417 IA-606 ST.CLOUD STATE UNIVERSITY SEP4, 2015 Cyber Attack: The attempt of breaching the security layers of an organization or a system by disrupting the network and there by accessing, stealing, modifying or destroying the valuable data and using the data for fraudulent purposes, causing a loss to the organization is called a Cyber Attack Origin: The idea of cyber attacks began at the earlier development of World Wide Web (www) in this stage there was not much harm to the organization but as there was advancement in technology the number of hackers increased day by day and also the effectiveness of the hacking technology has increased a lot which results a severe damage to the organization In more recent times many organizations like manufacturing companies, IT companies, banks and health care providers have been prone to the cyber theft and they lost huge volume of information which incurred huge losses to the companies. Some of the examples include the attack on Target, Primera Blue Cross, E-Bay, JP Morgan Chase bank Sony PSN and many other. These attacks have happened because of poor security measures and the loopholes in the system by which hackers gained access and made the companies to compromise a huge volume of information....

Words: 1000 - Pages: 4

Premium Essay

Web Server Application Attacks

...Running Head: Web Server Application Attacks Web Server Application Attacks Assignment # 1 Mariz Cebron Common web application vulnerabilities and attacks, and recommend mitigation strategies The World Wide Web has evolved into a critical delivery pipeline for institutions to interact with customers, partners and employees. Via browsers, people use web sites to send and receive information via Hypertext Markup Language (HTML) messages to web applications housed on web servers. This information, expected as legitimate messages, can be used illegitimately in unauthorized ways to compromise security vulnerabilities a.) Authentication - one of the biggest web application weaknesses is the failure to provide a means of strong authentication to verify the end user is whom he/she claims. Prior to accessing a web application, a server may require the end user to authenticate him/herself to identify the user or determine the user's access privileges. To mitigate these risks; employ strong authentication, such as HTTPS, with encrypted credentials, require authentication at specified time intervals or movement between web pages, regularly test authentication and implement authorization. b.) SQL injection - Many web applications do not properly strip user input of unnecessary special characters or validate information contained in a web request before using that input directly in SQL queries....

Words: 1656 - Pages: 7