IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 7 - Issue 5, May 2018 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cyber Security Risks For Modern Web Applications: Case Study Paper For Developers And Security Testers

[Full Text]

 

AUTHOR(S)

Devanshu Bhatt

 

KEYWORDS

Cyber Security, Cyber Security Risks, DAST, SAST, SQL Injection, Top 10, vulnerabilities, Web Application Security Risks

 

ABSTRACT

“May you survive in fascinating times" can be an English phrase claiming to be considered an interpretation of the traditional Chinese curse. Cyber Security risks are becoming top concerns as we find out frequent data breach occurrences on regular basis now a days from organizations like Equifax, Anthem, JP Morgan Chase and other large corporations. As per IBM this year's global average cost of data breach is $3.62 million. Findings from NIST (National Institute of Standards and Technology) shows that 92% of security vulnerabilities exists at the application layer not in the network layer. In this research paper; subsequent subject areas discussed -Introduction to Cyber security, Web applications security challenges, Top web applications vulnerabilities and conclusion with approaches and mindset to comprehend for developers and security testers.

 

REFERENCES

[1]. https://www.lifelock.com/education/history-of-data-breaches/

[2]. https://www.ibm.com/security/data-breach

[3]. https://info.whitehatsec.com/rs/675-YBI-674/images/WHS%202017%20Application%20Security%20Report%20FINAL.pdf

[4]. Source: Building a web application security program from Securosis.com

[5]. Source: CERT Securing your Web Browser

[6]. https://usa.kaspersky.com/about/press-releases/2017_kaspersky-lab-report-on-ddos-attacks-in-q1-2017-the-lull-before-the-storm

[7]. Source: Gartner presentation on SAST and DAST

[8]. https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project