Security Vulnerability of the World Wide Web

1840 Words4 Pages

Everyday tech users are increasingly engaged with web and mobile applications. These programs have many uses and can be very helpful in progressive usage. However, these applications also serve as the most accessible point of entry for malicious attackers to wreak havoc. The continual growth and usage of web-applications makes the infrastructure one that is susceptible to attack due to lack of thorough security implementation. The Open Web Application Security Project (OWASP) is a community-based non-profit organization that concentrates on increasing the safety in the realm of web applications. It was started in 2001 and ever since then its primary goal has been to create a high level of transparency in the web applications and software in order to allow society to make informed decisions. They have a very open and collaborative mentality when it comes to the sharing of knowledge to include and empower the masses. Each year OWASP publishes a list of most common web application vulnerabilities. The top three have remained relatively dominant over the past few years, regardless of which place they fall into. In 2013 they were: injection, broken authentication and session management, and cross-site scripting. The purpose of this paper is to delve further into three of the top web application vulnerabilities from the past few years and evaluate their impact.

Cross-Site Scripting (XSS) was the number one vulnerability in 2007 and remains prevalent today. XSS occur when an application takes untrusted data and sends it to a web browser without proper validation or escaping. This allows the attacker to implement scripts in the victim’s browser which allows them to execute various types of damage. By successfully utilizing cross-site sc...

... middle of paper ...

...ets/XSS_IAD_Factsheet_Final_Web.pdf https://www.owasp.org/index.php/Top_10_2013-Top_10 http://en.wikipedia.org/wiki/File_inclusion_vulnerability https://www.owasp.org/index.php/Top_10_2007-Malicious_File_Execution http://bretthard.in/2009/07/malicious-file-execution/ https://www.owasp.org/index.php/Top_10_2013-Top_10 http://projects.webappsec.org/w/page/13246955/Remote%20File%20Inclusion http://www.cisodesk.com/web-application-security/threats-mitigation/insecure-direct-object-references/ http://bretthard.in/2009/07/insecure-direct-object-reference/ https://www.owasp.org/index.php/Top_10_2013-Top_10 https://www.owasp.org/index.php/Top_10_2010-A4-Insecure_Direct_Object_References http://www.slideshare.net/RapPayne/a4-insecure-direct-object-referencepptx http://www.zone-h.org/news/id/4669
http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed

More about Security Vulnerability of the World Wide Web

Open Document