Monday, August 12, 2019
Web Security Essay Example | Topics and Well Written Essays - 4000 words
Web Security - Essay Example Web security manages and secures web traffic by sorting threats of web malware, blocking URLââ¬â¢s containing inappropriate content, and prevents the loss of confidential data over protocols on the web. Attackers use the web to deliver viruses such as malware. A huge percentage of breaches involve crimes that target corporate information. Another challenge of brand impairment occurs when the contractors or employees make postings that are inappropriate to sites of social networking. Therefore, the on-site contractors and employees expose an organization to legal uncertainties by visiting sites containing inappropriate content. Consequently, the productivity of an organization will suffer if the contractors and the employees exceed the use of the web during working hours. Web security ensures that the confidential information and networks are available and secure. Also, it protects the networks coming from outside such as malware posted over the web. Web security enhances the web p rotection and reduces the legal exposure by blocking restricted sites. Subsequently, it scans email of the internet and other web traffic that are outbound to reduce the loss of confidential data. It also prevents and detects proliferation to protect the end users against application threats. Web security also chooses among hosted, appliance, and premises options for web filtering and web security. Table of Contents WEB SECURITY. 1 MEMORANDUM 1 ABSTRACT. 6 INTRODUCTION 6 BACKGROUND 7 OBJECTIVES 8 FACTORS THAT CONTRIBUTE TO WEB SECURITY 8 Human and Technological Factors 9 The knowledge of the user 9 The technology that is in use at that particular time 9 Tools for Security 9 The necessary tools available for security 9 SECURITY CAN BE ACHIEVED BY ADDRESSING 9 User and Technology Factors 10 Responsibility of the User 10 Relevance to Security 10 Sweet Development 11 Design 12 Visualization 12 HISTORY OF WEB SECURITY 12 History of Web Tools 13 Preventing SQL injection 13 Creating awaren ess to web security 14 Tools to detect web attacks 14 Web versus desktop applications 15 Intelligent information systems 16 INTERNET CONTROLS: 16 Intrusion Detection System: 17 Signature-based network intrusion detection system: 18 Analysis-based network intrusion detection system: 18 Firewalls: 19 Encryption program: 19 Honey popts: 19 CONCLUSION 20 REFERENCE 21 3.Singh, Brijendra and Agarwal, Pooja. ââ¬Å"Algorithm for Web Server Securityâ⬠IETE Journal of Research57.5 (Sep 2011): 413-422. 22 6.Hossain, Md Safaet and Hossain, Md Shazzad. ââ¬Å"Web Test Integration and Performance Evaluation of E-Commerce Web Sitesâ⬠International Journal of Computer Science and Information Security10.9 (Sep 2012): 65-69. 23 7.Serrhini, Mohammed. Moussa, Abdelazziz Ait. ââ¬Å"Home Users Security and the Web Browser Inbuilt Settings, Framework to Setup IT Automaticallyâ⬠Journal of Computer Science9.2 (2013): 159-168. 23 9.Volkoviy, Andrei and Chekhov, Ilia. ââ¬Å"Use of Mobile Ap plications in Security and Safety Systemsâ⬠Information & Security28.1 (2012): 146-153. 24 APPENDIX A. GLOSSARY 25 IT Systems: These are secure systems developed and can automatically detect threats and ensure that they are removed without the involvement of the user. 26 APPENDIX B. RESEARCH METHODS. 28 ABSTRACT. This final report discusses the topic of web security and some of the risks that internet users all over the world experience. Over the years, web security has grown to become a very crucial part of our daily life. This is shown by the manner in which most of the world population conducts their business (Alanazi, Fahad, &Mohamed, 2011 87). These include, doing bank transactions,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.