The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Web Application Vulnerabilities and Their Countermeasures
Abstract
The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to compromise the application and the entire application environment. The areas that can be compromised include user and system administration accounts. In this chapter we identify the major classes of web application vulnerabilities, gives some examples of actual vulnerabilities found in real-life web application audits, and describes some countermeasures for those vulnerabilities. The classes are: 1) authentication 2) session management 3) access control 4) input validation 5) redirects and forwards 6) injection flaws 7) unauthorized view of data 8) error handling 9) cross-site scripting 10) security misconfigurations and 10) denial of service.
Related Content
Subhadip Kowar, Sneha Mukherjee, Shramana Ghosh.
© 2025.
26 pages.
|
C. V. Suresh Babu, Mala Raja Sekhar, A. Sachin, Bala Brindha.
© 2025.
26 pages.
|
A. D. N. Sarma.
© 2025.
32 pages.
|
Muhammad Usman Tariq.
© 2025.
26 pages.
|
Maaike Stoops, Pablo Alfonso Aguilar Calderón, Óscar Manuel Peña Bañuelos.
© 2025.
30 pages.
|
Pablo Alfonso Aguilar Calderón, José Alfonso Aguilar-Calderón, Dominik Morales-Silva, Carolina Tripp-Barba, Pedro Alfonso Aguilar-Calderón, Aníbal Zaldívar-Colado, Oscar Manuel Peña-Bañuelos.
© 2025.
30 pages.
|
Carlos Villarrubia, David Granada, Juan Manuel Vara.
© 2025.
34 pages.
|
|
|