Security Vulnerability of the World Wide Web Essay

Security Vulnerability of the World Wide Web Essay

Length: 1840 words (5.3 double-spaced pages)

Rating: Term Papers

Open Document

Essay Preview

Everyday tech users are increasingly engaged with web and mobile applications. These programs have many uses and can be very helpful in progressive usage. However, these applications also serve as the most accessible point of entry for malicious attackers to wreak havoc. The continual growth and usage of web-applications makes the infrastructure one that is susceptible to attack due to lack of thorough security implementation. The Open Web Application Security Project (OWASP) is a community-based non-profit organization that concentrates on increasing the safety in the realm of web applications. It was started in 2001 and ever since then its primary goal has been to create a high level of transparency in the web applications and software in order to allow society to make informed decisions. They have a very open and collaborative mentality when it comes to the sharing of knowledge to include and empower the masses. Each year OWASP publishes a list of most common web application vulnerabilities. The top three have remained relatively dominant over the past few years, regardless of which place they fall into. In 2013 they were: injection, broken authentication and session management, and cross-site scripting. The purpose of this paper is to delve further into three of the top web application vulnerabilities from the past few years and evaluate their impact.

Cross-Site Scripting (XSS) was the number one vulnerability in 2007 and remains prevalent today. XSS occur when an application takes untrusted data and sends it to a web browser without proper validation or escaping. This allows the attacker to implement scripts in the victim’s browser which allows them to execute various types of damage. By successfully utilizing cross-site sc...


... middle of paper ...


...ets/XSS_IAD_Factsheet_Final_Web.pdf
https://www.owasp.org/index.php/Top_10_2013-Top_10
http://en.wikipedia.org/wiki/File_inclusion_vulnerability
https://www.owasp.org/index.php/Top_10_2007-Malicious_File_Execution
http://bretthard.in/2009/07/malicious-file-execution/
https://www.owasp.org/index.php/Top_10_2013-Top_10
http://projects.webappsec.org/w/page/13246955/Remote%20File%20Inclusion
http://www.cisodesk.com/web-application-security/threats-mitigation/insecure-direct-object-references/
http://bretthard.in/2009/07/insecure-direct-object-reference/
https://www.owasp.org/index.php/Top_10_2013-Top_10
https://www.owasp.org/index.php/Top_10_2010-A4-Insecure_Direct_Object_References
http://www.slideshare.net/RapPayne/a4-insecure-direct-object-referencepptx
http://www.zone-h.org/news/id/4669
http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The Effects Of Computers On Our Modern Society Essay

- Introduction In the last decades or so, there has been an increasing dependency that individuals have created on computers. Thus, computers are currently being used in every facet of our modern society, from checking email, shopping, research, collection of data, to even payment of bills online. Furthermore, these actions, most of the time, require that personal and private information of the users, such as credit card information, bank account numbers and names of the individuals, to be disclosed in order to make certain transactions so that they can either be used momentarily or stored for later assess....   [tags: Computer, Computer security, World Wide Web]

Term Papers
1350 words (3.9 pages)

Essay on Information Security, Services, And Inter Connectivity

- PURPOSE The wide array of new resources, services, and inter-connectivity available through the Internet all introduce new business opportunities, and new security and privacy risks. In response to the risks, this policy describes the Company X official policy regarding Internet security. SCOPE AND APPLICABILITY This policy applies to all workers, employees, contractors, consultants, temporaries, and volunteers, who use the Internet with Company X computing or networking resources. Within this policy, the term “Internet” is used to reference all electronic communications which access the internet, including web sites, internet relay chat (IRC), message boards, or blogs....   [tags: Internet, World Wide Web, Computer security]

Term Papers
1244 words (3.6 pages)

How Internet Is The Internet Essay

- The Internet is a huge network connected to other networks. Internet can be used for a lot of things such as finding for information, communicate with another people from other places and a lot more. The Internet is also good for people that have a company but they do not see that. They think that the Internet is just for entertainments and communication but what the owners of the companies do not know is that the Internet also benefits them. They can set up a website for their business. There are a lot of advantages of setting up a website for a business and below are just some of the advantages....   [tags: Computer security, Internet, World Wide Web]

Term Papers
999 words (2.9 pages)

Web Security And Web Privacy Attacks Essay

- Web security & Web Privacy Attacks: Introduction and preface to the problem Web privacy is a key web security concern to almost all the internet users now a days. Lapses in Web security essentially possessing the threat to the privacy loss. All the information related to the personal identity, web browsing history, web activities are some of the essential key concerns that people loose during the web privacy attack. Information revolution spurred in the recent times added to the significance to the problem severity....   [tags: World Wide Web, Internet, Web page]

Term Papers
1147 words (3.3 pages)

Updates Over Security Software Essay

- Almost all information technology professionals, believe their ideas will be the most effective way to protect their computer networks and end users from viruses, Trojans, malware, and intrusion. Every day users expose themselves to security related concerns. Developers release patches and updates every day; these updates affect firmware, operating systems, application, and device drivers. With most users and devices connected to the Internet, security is a very important hurdle. In the battle against invasion the most important step is keeping all devices and subordinate applications up-to-date....   [tags: malware, world wide web, malicious apps]

Term Papers
1692 words (4.8 pages)

Censorship And The World Wide Web Essay

- The World Wide Web is censored in order to control the availability to illegal or deceitful information citizens have. Even though Internet and Web are thrown around interchangeably in many situations, there is a difference to distinguish between them. The Internet is a massive network of networks exchanging information together, which links computers together globally. The web is a way of accessing the information available on the Internet through the correct software ("CHM Revolution"). Depending on the country, censorship can be developed into different levels of security....   [tags: World Wide Web, Internet, Internet censorship]

Term Papers
1113 words (3.2 pages)

Essay on Internet Privacy And Security : Google It !

- “Google it!” This statement has redefined how we conduct research in the 21st century. Whether you are curious about the latest medical research, reviewing recent Supreme Court rulings, or simply trying to find the best Ethiopian restaurant for dinner, search engines are an invaluable tool. The problem lies in the authenticity of the information. How do you separate fact from fiction. Additionally, how do you vet information from common search engines such as Google and Bing. In regards specifically to research, what do sites such as EBSCOhost’s Academic Search Database provide over traditional search engines....   [tags: Internet, World Wide Web, Web search engine, Bing]

Term Papers
835 words (2.4 pages)

The Hidden Web And The Deep Web Essay

- “The Hidden Web”, or more commonly known as “The Deep Web”, is a fraction of the Internet that is not indexed by standard search engines like Google, Bing, Yahoo, etcetera. The reason for this is due to the fact that standard search engines cannot directly access data that is held in databases, which makes it extremely difficult for search engines to index. So, if standard search engines cannot access the Deep web, what can. And what is the primary purposes and intentions of people who use it. Even though the average, ordinary person like you and I have no business to conduct there, there are others who are not so ‘ordinary’, those who may use the Deep Web for either mere casual leisure, or...   [tags: World Wide Web, Deep Web, Tor, Surface Web]

Term Papers
1323 words (3.8 pages)

Cryptography And The World Wide Web Essay examples

- For thousands of years cryptography and encryption have been used to secure communication. Military communication has been the leader of the use of cryptography and the advancements. From the start of the internet there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989....   [tags: Cryptography, Encryption, Cipher, Key]

Term Papers
1276 words (3.6 pages)

Internet Security Essay

- Internet Security Internet Security is the most important aspect of information technology. It has been years since computer has been invented and to keep the information confidential we have to safeguard this information. The importance of integrating security measures into systems development. Every business has their own security systems to reach their goals of information security. The computer world created security systems in order to reduce risk, maintain confidentiality, ensure the reliability of data resources, and compliance with national security laws and privacy policies and laws....   [tags: Internet Privacy Security Web Essays]

Term Papers
1457 words (4.2 pages)