Preview

Web Security Issues

Better Essays
Open Document
Open Document
911 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Security Issues
This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security.
SQL Insertion Attacks SQL injection is a type attack where harmful code is attached to strings that are passed to SQL Server to be run. All procedures that build SQL statements need to be examined for possible ways of exploitation because SQL Server will run any query it receives, as long as it makes sense to the server. Even data that has parameters may be used by an attacker.
The injection is done by ending a string consisting of text early and giving a new command. Because the inserted command may have other strings added to it before it is ran, the harmful code stops the injected string and adds a comment mark "--". Once the command is run, any text that follows is ignored (MSDN, 2010).
Java Script Insertion Attacks Whenever a web site accepts and redisplays input from a user, it becomes accessible to Java script injection attacks. Malicious attackers can do some heavy damage by injecting JavaScript into a website. JavaScript injection attacks can be used to launch a Cross-Site Scripting (XSS) attack. In this type of attack, private information is stolen and sent to another website. Attackers can also use java script insertion to steal values from browser cookies. If private information such as social security numbers, bank account numbers, or passwords is stored within the cookies, it can be stolen. Java script insertion attacks can also be used to steal form field data that a user may fill out and send it to another web site (Microsoft, 2010).
Hidden Field Manipulation Hidden fields are encoded into HTML forms to keep values that are to be



References: Fortify (2010). Header Manipulation. Retrieved October 16, 2010, from https://www.fortify.com/vulncat/en/vulncat/php/header_manipulatio html Imperva (2010). Cookie Poisoning. Retrieved October 16, 2010, from http://www.imperva.com/resources/glossary/cookie_poisoning.html Knowledge Base (2010). About Viruses, Worms, and Trojan Horses. Retrieved October 16, 2010, from http://kb.iu.edu/data/aehm.html Microsoft (2010). Preventing JavaScript Injection Attacks. Retrieved October 16, 2010, from http://www.asp.net/mvc/tutorials/preventing-javascript-injection-attacks-cs MSDN (2010). SQL Injection. Retrieved October 16, 2010, from http://msdn.microsoft.com/en-us/library/ms161953.aspx Sanctum (2002). Ethical Hacking Techniques to Audit and Secure Web- enabled Applications

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The goal of an XSS attack is to gain administrator or some other elevated level of user privileges.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pt1420 Unit 7 Analysis

    • 737 Words
    • 3 Pages

    Unexpectedly, these tools suggested in other answers are only looking at some of the above properties of the site for us, admitting automatically, and imperceptibly faster :)…

    • 737 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cross-site scripting is a type of computer security exposure found in web function such as XSS which attacker attach to the client side of a script.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.…

    • 1245 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Attention requires an intensive focusing of web security efforts and money the most significant threats along with the common vulnerabilities exploited. Sensitive attribute inference through machine learning algorithms it is possible to infer sensitive data from one user. Collecting data from user’s contacts and experimented attacker can predict some not explicit data. For example, if all the friends of one user belong to one political party, it is safe to predict that the user has the same political tendencies. Excessive exposition of private data inadequate privacy configuration settings may lead to publishing sensitive information.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Better Essays

    SQL or Structured Query Language is a specialized language for updating, deleting, and requesting information form databases. SQL is also an ANSI and ISO standard, and is one of the only database query languages. A plethora of already established database products support SQL. Some of the products that support SQL are Oracle and Microsot SQL Server. It is widely used in both industry and college institutions. Usually for enormous, complex databases. (Base2013).…

    • 769 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Final Test

    • 3035 Words
    • 13 Pages

    __________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information.…

    • 3035 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    We can use semicolon to finish a SQL statement and then append update/insert/delete statement right after semicolon in order to modify the database by SQL injection. Therefore the database will receive two statements at the same time. I tried the following sentence in the log in window.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These attacks are the most common. This type of attack requires the victim to click or use other input to initiate the attack (Sawyer, 2009). These inputs use a link set by the attacker to bounce a signal through the victims web browser and execute the attack.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays