Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Security Issues for Web Applications DB, Essay Example

Pages: 2

Words: 522

Essay

Application Security

Application security is considered to be an essential aspect for information security. Organizations acquire third party services or hire information security specialist for conducting vulnerability assessment, testing the code before deployment and penetration testing to verify integrity and authenticity of the code before operation. However, in order to fulfill these requirements, information security specialist utilized various tools to detect and audit vulnerabilities to ensure application security. For securing data privacy on the World Wide Web, a study was carried out in association with automatic SQL injection and cross site scripting attacks. Likewise, the objective of this study is to prevent SQL injection and cross site scripting attacks by a tool called as ‘Andrilla’. This tool incorporates PHP based techniques for input generation, input mutation and dynamic propagation for analyzing inputs that has inherent weaknesses. Moreover, storage for taint is carried out by the symbolic database. Furthermore, the tool is also efficient for detecting and minimizing embedded application threats associated with XSS. In addition, the results of this study identified and detected 68 SQL injection attacks covering five applications. However, results were reflecting high accuracy and low false positives (Kieżun, Guo, Jayaraman, & Ernst, 2009).Moreover, this tool creates attack vectors associated with XSS and SQL injection for web based application incorporated with PHP. Likewise, considering SQL injection and XSS, as the most common threats for applications security, the tool constructs inputs that reflect SQL injection and XSS weaknesses. Moreover, construction of inputs considered as inputs and tracking of symbolic tracking via execution is a job for the tool and as a result, concrete exploits are produced (Kieżun, Guo, Jayaraman, & Ernst, 2009). On the other hand, runtime overhead for the implemented application operates in a normal manner i.e. no issues in runtime and no requirement of modifying the application code along with construction of programming language that change frequently (dynamic).

Moreover, one more tool known as the metaspolit tool utilized a framework based on an open source platform. This platform facilitates the development, testing and integration of an exploit code within the application (Metasploit.2007). However, at the beginning, the metasploit tool was started as a project known for portable network games and later on transformed in to a powerful tool used for penetrating testing, vulnerability assessment and exploit development (Metasploit.2007). The development of this tool is based on Perl scripting language along with some components that are compiled in C language, assembler and Python. The advantage from the Perl language is the compatibility, as the framework can be executed on almost every platform in default configurations (Metasploit.2007). Likewise, an open source and advanced platform, it is also utilized for testing, exploiting the code and development. Moreover, the extensive framework via an integration of payloads, encoders and exploits made this tool a revolutionary engine for research associated with exploitation. Furthermore, there are numerous modules that are available on the Internet.  With the help of these modules, one can code a customized exploit.

References

Kieżun, A., Guo, P. J., Jayaraman, K., & Ernst, M. D. (2009). Automatic creation of SQL injection and cross-site scripting attacks. ICSE: International Conference on Software Engineering, , 199-209.

Metasploit.(2007). Network Dictionary, , 307-307.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Email and Voicemail Monitoring, Essay Example

When it comes to email and voicemail monitoring, it is important to consider the implications of these actions on behalf of both the employee as [...]

Pages: 1

Words: 340

Essay

Description of Place: A Forest, Essay Example

The logic behind the significance of specific locations to individuals inevitably varies. Some places may hold pertinence since they are the sites of important personal [...]

Pages: 1

Words: 315

Essay

Quality Management System, Essay Example

Customer needs and expectations are the products any customer attaches to a company and knows that he or she will get it when need arises. [...]

Pages: 1

Words: 337

Essay

What Does It Take To Be a Good Parent Assignment, Essay Example

The issue of what does it take to be a good parent is contentious, insofar as the thematic remains susceptible to subjective interpretations. One may [...]

Pages: 1

Words: 330

Essay

Human Rights Violations and the Legal System, Essay Example

The Universal Declaration of Human Rights (hereinafter: UDHR), advanced by the United Nations General Assembly in 1947, was a watershed moment, insofar as with this [...]

Pages: 4

Words: 1122

Essay

The Critical Consulting Firm, Essay Example

Week 5 Issues The CanGo operation provides interesting insights into, unfortunately, how to conduct employee relations poorly. This is obviously not the company’s intent; on [...]

Pages: 5

Words: 1287

Essay

Email and Voicemail Monitoring, Essay Example

When it comes to email and voicemail monitoring, it is important to consider the implications of these actions on behalf of both the employee as [...]

Pages: 1

Words: 340

Essay

Description of Place: A Forest, Essay Example

The logic behind the significance of specific locations to individuals inevitably varies. Some places may hold pertinence since they are the sites of important personal [...]

Pages: 1

Words: 315

Essay

Quality Management System, Essay Example

Customer needs and expectations are the products any customer attaches to a company and knows that he or she will get it when need arises. [...]

Pages: 1

Words: 337

Essay

What Does It Take To Be a Good Parent Assignment, Essay Example

The issue of what does it take to be a good parent is contentious, insofar as the thematic remains susceptible to subjective interpretations. One may [...]

Pages: 1

Words: 330

Essay

Human Rights Violations and the Legal System, Essay Example

The Universal Declaration of Human Rights (hereinafter: UDHR), advanced by the United Nations General Assembly in 1947, was a watershed moment, insofar as with this [...]

Pages: 4

Words: 1122

Essay

The Critical Consulting Firm, Essay Example

Week 5 Issues The CanGo operation provides interesting insights into, unfortunately, how to conduct employee relations poorly. This is obviously not the company’s intent; on [...]

Pages: 5

Words: 1287

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!