Full Paper View Go Back

Web Security: An Overview and Current Trend

P. K. Paul1 , P. S. Aithal2

Section:Review Paper, Product Type: Journal-Paper
Vol.6 , Issue.1 , pp.52-54, Oct-2019


Online published on Oct 31, 2019


Copyright © P. K. Paul, P. S. Aithal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. K. Paul, P. S. Aithal, “Web Security: An Overview and Current Trend,” World Academics Journal of Engineering Sciences, Vol.6, Issue.1, pp.52-54, 2019.

MLA Style Citation: P. K. Paul, P. S. Aithal "Web Security: An Overview and Current Trend." World Academics Journal of Engineering Sciences 6.1 (2019): 52-54.

APA Style Citation: P. K. Paul, P. S. Aithal, (2019). Web Security: An Overview and Current Trend. World Academics Journal of Engineering Sciences, 6(1), 52-54.

BibTex Style Citation:
@article{Paul_2019,
author = {P. K. Paul, P. S. Aithal},
title = {Web Security: An Overview and Current Trend},
journal = {World Academics Journal of Engineering Sciences},
issue_date = {10 2019},
volume = {6},
Issue = {1},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {52-54},
url = {https://www.isroset.org/journal/WAJES/full_paper_view.php?paper_id=1554},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/WAJES/full_paper_view.php?paper_id=1554
TI - Web Security: An Overview and Current Trend
T2 - World Academics Journal of Engineering Sciences
AU - P. K. Paul, P. S. Aithal
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 52-54
IS - 1
VL - 6
SN - 2347-2693
ER -

330 Views    252 Downloads    101 Downloads
  
  

Abstract :
Websites are the mirrors ofthe modern IT Age. It is very difficult to find out the areas and sectors where Websites are not using. Initially, only big organizations and multinational companies being uses websites but gradually small organizations and institutions and individuals are also having websites of different kinds and purposes. It is (Website) the collection of resources of different network web resources viz. multimedia, contents, etc and published in one or more servers. In websites domain names, IP addresses are a very important concern. There may be different kinds of websites viz. static, dynamic and in all these abilities to keep a large amount of data. In the recent past, websites increased radically. Due to the wide uses and number of websites, today a huge amount of data stored into the systems and thus their security also becomes an important concerned. Thus, the concept of Web Security or Web Application Security has emerged. Today it is an important concern of Information Technology Security. Web Security is the affairs of security related to the websites, web services and web based applications as a whole. This paper is a kind of review and trend analysis of website and web security. Paper described the basics of web security, the reasons/ threats including various defending mechanism as well. Paper highlighted the challenges and issues as well in a simple context

Key-Words / Index Term :
Web Security, IT Security, Web Portal, Information Security, Information Services, Emerging Services

References :
[1] Borgesius, F. Z., Gray, J., & Van Eechoud, M. (2015). Open data, privacy, and fair information principles: Towards a balancing framework. Berkeley Technology Law Journal, 30(3), 2073-2131.
[2] Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
[3] George, B., & Valeva, A. (2006, March). A database security course on a shoestring. In ACM SIGCSE Bulletin (Vol. 38, No. 1, pp. 7-11). ACM.
[4] Holla, S., & Katti, M. M. (2012). Android based mobile application development and its security. International Journal of Computer Trends and Technology, 3(3), 486-490.
[5] Krishnan, V., McCalley, J. D., Henry, S., & Issad, S. (2011). Efficient database generation for decision tree based power system security assessment. IEEE Transactions on Power systems, 26(4), 2319-2327.
[6] Li, Y., Stweart, W., Zhu, J., & Ni, A. (2012). Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC Fair Information Practice Principles and readability assessment. Communications of the IIMA, 12(3), 5.
[7] Mathieu, R. G., & Khalil, O. (1998). Data quality in the database systems course. Data Quality Journal, 4(1), 1-12.
[8] Murray, M., & Guimaraes, M. (2008). Expanding the database curriculum. Journal of Computing Sciences in Colleges, 23(3), 69-75.
[9] Murray, M. C. (2010). Database security: What students need to know. Journal of information technology education: Innovations in practice, 9, IIP-61.
[10] Neto, A. A., Vieira, M., & Madeira, H. (2009, June). An appraisal to assess the security of database configurations. In 2009 Second International Conference on Dependability (pp. 73-80). IEEE.
[11] Ritchie, P. (2007). The security risks of AJAX/web 2.0 applications. Network Security, 2007(3), 4-8.
[12] Rubin, A. D., & Geer, D. E. (1998). A survey of Web security. Computer, 31(9), 34-41.
[13] Said, H. E., Guimaraes, M. A., Maamar, Z., & Jololian, L. (2009). Database and database application security. ACM SIGCSE Bulletin, 41(3), 90-93.
[14] Sandhu, R. S., & Jajodia, S. (1993). Data and database security and controls. Handbook of information security management, Auerbach Publishers, 1-37.
[15] Smith, G. W. (1991). Modeling security-relevant data semantics. IEEE Transactions on Software Engineering, (11), 1195-1203.
[16] Srinivasan, S., and Anup Kumar. "Database security curriculum in InfoSec program." In Proceedings of the 2nd annual conference on Information security curriculum development, pp. 79-83. ACM, 2005.
[17] Stein, Lincoln D. "Web security." Addison-Wesley, Massachusetts 26 (1998): 1-4.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation