Wednesday, June 19, 2019

Web Security Essay Example | Topics and Well Written Essays - 4000 words

Web security system - Essay ExampleWeb tribute manages and secures entanglement traffic by sorting threats of web malware, mental block URLs containing inappropriate content, and prevents the loss of confidential data over protocols on the web. Attackers use the web to deliver viruses such as malware. A enormous percentage of breaches involve crimes that target corporate information. Another challenge of brand impairment occurs when the contractors or employees make postings that are inappropriate to sites of social networking. Therefore, the on-site contractors and employees ambuscade an organization to sub judice uncertainties by visiting sites containing inappropriate content. Consequently, the productivity of an organization will suffer if the contractors and the employees exceed the use of the web during working hours. Web security ensures that the confidential information and networks are available and secure. Also, it protects the networks coming from outside such as ma lware posted over the web. Web security enhances the web protection and reduces the legal exposure by blocking restricted sites. Subsequently, it scans email of the internet and other web traffic that are outbound to reduce the loss of confidential data. It alike prevents and detects proliferation to protect the end substance abusers against application threats. Web security also chooses among hosted, appliance, and premises options for web filtering and web security. Table of Contents WEB tribute. 1 MEMORANDUM 1 ABSTRACT. 6 INTRODUCTION 6 BACKGROUND 7 OBJECTIVES 8 FACTORS THAT CONTRIBUTE TO WEB SECURITY 8 Human and Technological Factors 9 The knowledge of the user 9 The technology that is in use at that particular time 9 Tools for Security 9 The necessary tools available for security 9 SECURITY CAN BE ACHIEVED BY ADDRESSING 9 User and Technology Factors 10 Responsibility of the User 10 Relevance to Security 10 Sweet instruction 11 Design 12 Visualization 12 HISTORY OF WEB SECURI TY 12 History of Web Tools 13 Preventing SQL injection 13 Creating cognizance to web security 14 Tools to detect web attacks 14 Web versus desktop applications 15 Intelligent information systems 16 INTERNET CONTROLS 16 attack Detection System 17 Signature-based network intrusion detection system 18 Analysis-based network intrusion detection system 18 Firewalls 19 encoding program 19 Honey popts 19 CONCLUSION 20 REFERENCE 21 3.Singh, Brijendra and Agarwal, Pooja. Algorithm for Web Server Security IETE Journal of Research57.5 (Sep 2011) 413-422. 22 6.Hossain, Md Safaet and Hossain, Md Shazzad. Web Test Integration and Performance Evaluation of E-Commerce Web Sites International Journal of Computer Science and knowledge Security10.9 (Sep 2012) 65-69. 23 7.Serrhini, Mohammed. Moussa, Abdelazziz Ait. Home Users Security and the Web Browser Inbuilt Settings, Framework to Setup IT Automatically Journal of Computer Science9.2 (2013) 159-168. 23 9.Volkoviy, Andrei and Chekhov, Ilia. Use of Mobile Applications in Security and Safety Systems Information & Security28.1 (2012) 146-153. 24 APPENDIX A. GLOSSARY 25 IT Systems These are secure systems developed and can automatically detect threats and ensure that they are removed without the involvement of the user. 26 APPENDIX B. RESEARCH METHODS. 28 ABSTRACT. This final report discusses the topic of web security and some of the risks that internet users all over the world experience. Over the years, web security has grown to become a very crucial part of our daily life. This is shown by the manner in which most of the world population conducts their business sector (Alanazi, Fahad, &Mohamed, 2011 87). These include, doing bank transactions,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.