Preview

Web Security Issues

Better Essays
Open Document
Open Document
911 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Security Issues
This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security.
SQL Insertion Attacks SQL injection is a type attack where harmful code is attached to strings that are passed to SQL Server to be run. All procedures that build SQL statements need to be examined for possible ways of exploitation because SQL Server will run any query it receives, as long as it makes sense to the server. Even data that has parameters may be used by an attacker.
The injection is done by ending a string consisting of text early and giving a new command. Because the inserted command may have other strings added to it before it is ran, the harmful code stops the injected string and adds a comment mark "--". Once the command is run, any text that follows is ignored (MSDN, 2010).
Java Script Insertion Attacks Whenever a web site accepts and redisplays input from a user, it becomes accessible to Java script injection attacks. Malicious attackers can do some heavy damage by injecting JavaScript into a website. JavaScript injection attacks can be used to launch a Cross-Site Scripting (XSS) attack. In this type of attack, private information is stolen and sent to another website. Attackers can also use java script insertion to steal values from browser cookies. If private information such as social security numbers, bank account numbers, or passwords is stored within the cookies, it can be stolen. Java script insertion attacks can also be used to steal form field data that a user may fill out and send it to another web site (Microsoft, 2010).
Hidden Field Manipulation Hidden fields are encoded into HTML forms to keep values that are to be



References: Fortify (2010). Header Manipulation. Retrieved October 16, 2010, from https://www.fortify.com/vulncat/en/vulncat/php/header_manipulatio html Imperva (2010). Cookie Poisoning. Retrieved October 16, 2010, from http://www.imperva.com/resources/glossary/cookie_poisoning.html Knowledge Base (2010). About Viruses, Worms, and Trojan Horses. Retrieved October 16, 2010, from http://kb.iu.edu/data/aehm.html Microsoft (2010). Preventing JavaScript Injection Attacks. Retrieved October 16, 2010, from http://www.asp.net/mvc/tutorials/preventing-javascript-injection-attacks-cs MSDN (2010). SQL Injection. Retrieved October 16, 2010, from http://msdn.microsoft.com/en-us/library/ms161953.aspx Sanctum (2002). Ethical Hacking Techniques to Audit and Secure Web- enabled Applications

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Pt1420 Unit 7 Analysis

    • 737 Words
    • 3 Pages

    Unexpectedly, these tools suggested in other answers are only looking at some of the above properties of the site for us, admitting automatically, and imperceptibly faster :)…

    • 737 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Cross-site scripting is a type of computer security exposure found in web function such as XSS which attacker attach to the client side of a script.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.…

    • 1245 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    SQL or Structured Query Language is a specialized language for updating, deleting, and requesting information form databases. SQL is also an ANSI and ISO standard, and is one of the only database query languages. A plethora of already established database products support SQL. Some of the products that support SQL are Oracle and Microsot SQL Server. It is widely used in both industry and college institutions. Usually for enormous, complex databases. (Base2013).…

    • 769 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    Cross-site scripting is a type of computer security vulnerability typically found in web applications that enables attacks to inject client side script into web pages viewed by others…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    We can use semicolon to finish a SQL statement and then append update/insert/delete statement right after semicolon in order to modify the database by SQL injection. Therefore the database will receive two statements at the same time. I tried the following sentence in the log in window.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The most common application exploit or attack is through SQL injection. This type of attack can be countered by removing the ability to run direct SQL queries through input and having a thorough exception handling principles in the applications. Closing the window on weakness through exception handling vulnerabilities will help secure against SQL injection.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays