100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

Web Programming/Development Course Notes

Rating
-
Sold
-
Pages
4
Uploaded on
25-02-2023
Written in
2022/2023

Are you looking to learn web development but don't know where to start? Do you struggle to keep track of all the different languages, frameworks, and tools that are used in web development? Look no further! Our web development notes have got you covered. Our comprehensive notes cover all the essential concepts and technologies used in web development, including HTML, CSS, JavaScript, PHP, SQL, and more. Whether you're a beginner just starting out or an experienced developer looking to brush up on your skills, our notes are the perfect resource for you. Our notes are organized in an easy-to-follow format, with clear explanations and practical examples that will help you to understand each concept and how to apply it in real-world scenarios. Plus, our notes are constantly updated to ensure that you have access to the latest tools and technologies used in web development. Don't waste any more time struggling to learn web development on your own. Get our web development notes today and take your skills to the next level! With our notes, you'll have everything you need to become a successful web developer and build amazing websites and web applications.

Show more Read less
Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
February 25, 2023
Number of pages
4
Written in
2022/2023
Type
Class notes
Professor(s)
Unknown
Contains
All classes

Subjects

Content preview

Web Security



Chapter 11. Basic Issues in Web
Security

Table of Contents

Objectives 1
11.1 Introduction to Web Security................................................................................................................. 1
11.1.1 Why the Internet is Insecure? ..................................................................................................... 1
11.1.2 Why make information secure? ................................................................................................... 2
11.2 Common vulnerabilities ........................................................................................................................ 2
11.2.1 SQL Injection ............................................................................................................................... 2
11.2.2 Buffer Overflow ........................................................................................................................... 3
11.2.3 Sensitive Data Exposure .............................................................................................................. 3
11.2.4 Broken Authentication and Session Management........................................................................ 3
11.2.5 Security Misconfiguration............................................................................................................ 3
11.3 Web Security Solutions ......................................................................................................................... 3
11.3.1 HTTPS 3
11.3.2 Certificates ................................................................................................................................... 4
11.3.3 Encryption .................................................................................................................................... 4
11.4 Discussion ............................................................................................................................................. 4



Objectives
At the end of this chapter you will be able to:
• Understand the need for web security;
• Understand some of the common web security vulnerabilities; and
• Understand some of the web security solutions.


11.1 Introduction to Web Security
When information transmitted over the web, not only does the data have reach its destination, but it needs to arrive
intact and uncorrupted (integrity), and other people should be prevented from seeing it (confidentiality). The
nature of the Internet makes directing information to reach its destination relatively trivial, but ensuring its
integrity and confidentiality is more difficult. Fortunately, encryption algorithms have made both integrity and
confidentiality feasible. Additionally, users like to know that the information they receive is genuine
(authentication) and that the sender of the information cannot deny that they sent it (non-repudiation).

The web is an interconnection of networks. Everybody uses the Internet to transfer data and that the data has
value (and cost), and so it is a subject to theft. Types of information that are stolen include personal user's
information, commercial or technical data (including commercial secrets and intellectual property), or even
security and military information. Leaking of such information can stay undiscovered for months, if not years,
doing damage to people that sent information and also to third parties.


11.1.1 Why the Internet is Insecure?
One of the main reasons for such vulnerabilities is the fact that web application developers are often not very well
versed with secure programming techniques. As a result, security of the application is not necessarily one of the
design goals. This is exacerbated by the rush to meet deadlines in the fast-moving e-commerce world.

The Internet is a packet-passing network, and so information sent from one machine to another passes through
1
$20.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
arshshops24

Get to know the seller

Seller avatar
arshshops24 SAIT
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
2 year
Number of followers
0
Documents
12
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions