Tuesday, June 7, 2022

Academic Paper Summary

 





In this writing the authors discuss prevention of unauthorized attacks on web applications because of increased amounts of data being used online. In this paper the issue of web security had been addressed to e commerce platforms and academic websites. Various vulnerabilities prevention trends had been analysed using different security methods.

Most notable vulnerability it is the invalidated input. During this process the web app fails to check the appropriate input allowing attackers to enter malicious information into the application avoiding the app security. Solution proposed for this vulnerability could be a validity check on inputted parameters based on data types. Another common vulnerability noticed is the improper error management. This technique it is used by attackers to insert errors inside the web application interfering with app functionality and creating error messages.  To increase security, it is advised to restrict the error messages based on users’ credentials and build a feature that will allow applications to display the correct error massage.  

Furthermore, the increase of security risk had been noticed in Academia because of continuous growth in terms of data and volume variety. Most common vulnerabilities in academia refer to unnecessary access that creates numerous opportunities for attackers. A restricted access inside the university’s portal could reduce the risk of being targeted. To protect databases, it is advised to use different servers, use encryption for backup files and implement firewalls to prevent attacks on websites through SQL injections. Furthermore, operating system can increase security by installing intrusion detecting system, secure installation and configuration systems that identify and eliminate insignificant applications and services.

Authors suggested that governments should create laws and regulations regarding web attacks and ensure that these will be implemented accordingly. A concern had been raised on companies that should be responsible for their security and identify vulnerabilities and adopt adequate solution. Another concerning aspect is the fast pace this field has, and it is not advised the use of low security IDE platforms to create website and applications. In conclusion this paper covers various aspects of security models used in the field of academics, e-commerce and present solution that help increasing security on operating systems and databases.


References

Yadav, Gupta, Singh, Kumar and Sharma, 2018. Vulnerabilities and Security of Web Applications. [online] Ieeexplore.ieee.org. Available at: <https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8777558&casa_token=VMY2dpPHyz4AAAAA:-G2OjlTremUJ8AFvNT-vd3XqKmUFRIll_ZPRUxJEddv9Jvoo6OsdeLehmh3JS4lqI6NtRCwIBg> [Accessed 7 June 2022].

No comments:

Post a Comment

Initial Project Plan( Gantt Chart Update)