期刊论文详细信息
Сучасні інформаційні системи
WEB APPLICATION PROTECTION TECHNOLOGIES
Yaroslav Tsokota1  Oksana Popovichenko1  Volodymyr Pevnev1 
[1] National Aerospace University “Kharkiv Aviation Institute”, Kharkiv;
关键词: web application;    vulnerability;    attack;    web applications protection;    secure application;   
DOI  :  10.20998/2522-9052.2020.1.18
来源: DOAJ
【 摘 要 】

The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications. The tasks to be solved are: view statistics on web attacks on web applications; identify the main prerequisites for cyber-attacks; considered the most common types of vulnerabilities; suggest ways to create a secure application. The methods used are: analytical method, literature analysis, description. The following results were obtained: For each given type of vulnerability, a scenario of a possible attack by an attacker was considered. There were also suggested ways for developers to use these vulnerabilities and develop a secure web application. Conclusions. Keep in mind that the best protection for web applications is writing safe code. Developers who implement applications should be aware in advance of the existence of common types of attacks and how they work in order to protect applications and prevent possible cyber-attacks. It is best to use security methods comprehensively to protect your web application as much as possible.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次