Protecting web application data from internal threats

نویسندگان

چکیده

With the rapid development of Internet, web applications are becoming more and popular. Many people, groups, organizations, or governments use as a means to share information support business tasks. growing number threats attacks on applications, organizations need effective concept application security. The article is devoted security methods ensuring three-level data protection architecture. A architecture an architectural model software package that assumes it has three components: client, server, database server. Web about protecting privacy, integrity, availability organization's resources, well its reputation. It also includes policies, procedures, laws, practices. Security, like other components application, best managed if planned at initial stage development. describes These will help professionals develop conduct risk assessments, eliminate potential risks in cost-effective way.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting the Nation from Health Security Threats

Events in the United States and internationally have shown the kinds of great stakes and consequences that often follow epidemics and disasters. Consider the series of health security shocks since 2001: National fear during the anthrax letters events, with impact on all 3 branches of the US government. The respiratory transmissible SARS and MERS viruses spreading via airplanes and hospitals, so...

متن کامل

Hails: Protecting Data Privacy in Untrusted Web Application

Many modern web platforms are no longer written by a single entity, such as a company or individual, but consist of a trusted core that can be extended by untrusted third-party authors. Examples of this approach include Facebook, Yammer, and Salfesforce. Unfortunately, users running a third-party “app” have little control over what it does with their private data. Today’s platforms offer only a...

متن کامل

Protecting the FPGA Design From Common Threats

The global estimated loss to counterfeiting is expected to exceed U.S.$1.5 trillion in 2009. Counterfeiting impacts all businesses in all markets, from Gucci handbags to computer chips to proprietary algorithms. The threats to companies’ intellectual property (IP) grow as the global supply chain becomes increasingly complex. Security and protection in the global supply chain is critical to main...

متن کامل

Protecting Against Unsampled Ionospheric Threats

Nominally, the mid-latitude ionosphere sampled by WAAS is smooth and slowly varying. However, during ionospheric storms, small-scale irregularities may form. These irregularities cause rapid changes in Total Electron Content (TEC) over comparatively short distances. WAAS has observed changes greater than 20 meters of vertical delay at the GPS L1 frequency over a few hundred kilometers. Such fea...

متن کامل

Protecting Infrastructure Assets from Real-Time and Run-Time Threats

Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ??????? ?????????

سال: 2021

ISSN: ['2313-3627', '2523-4978']

DOI: https://doi.org/10.51301/vest.su.2021.i4.06