مشخصات مقاله | |
ترجمه عنوان مقاله | توسعه امن وب با استفاده از راهنمایی های OWASP |
عنوان انگلیسی مقاله | Secure Web development using OWASP Guidelines |
انتشار | مقاله سال 2021 |
تعداد صفحات مقاله انگلیسی | 10 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه IEEE |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر – مهندسی فناوری اطلاعات |
گرایش های مرتبط | برنامه نویسی کامپیوتر – مهندسی نرم افزار – امنیت اطلاعات – طراحی و تولید نرم افزار |
نوع ارائه مقاله |
کنفرانس |
مجله / کنفرانس | کنفرانس بین المللی رایانش هوشمند و سیستم های کنترل – International Conference on Intelligent Computing and Control Systems |
دانشگاه | University Chennai, Tamil Nadu, India |
کلمات کلیدی | آسیب پذیری ها، OWASP، مدیریت Session، احراز هویت ناموفق، SQL injection، هشینگ رمز عبور، نشر داده های حساس، و تایید سرور |
کلمات کلیدی انگلیسی | Vulnerabilities, OWASP, SQL injection, Session Management, Broken authentication, Password Hashing, Sensitive data exposure, and Server verification. |
شناسه دیجیتال – doi |
https://doi.org/10.1109/ICICCS51141.2021.9432179 |
کد محصول | E16176 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract Document Sections I. Introduction II. Objective III. Proposed Idea IV. Related Works V. Levels of User Authentication and Securing User Data VI. Architecture VII. Methods to Secure the Web Application VIII. Implementation IX. Results X. Novelty XI. Conclusion |
بخشی از متن مقاله: |
Abstract: Website security is a major concern for large organizations as well as individual developers, the rarer the technology used the harder it becomes to come up with secure practices for developing a website. Vulnerabilities that are not fixed during development, and are deployed as such become easy targets for hackers. This could cause the company or the individual to lose a lot of money. It is not just the developers who are affected, end users who end up on vulnerable websites may get exposed to XSS attack which could compromise their system or an unsecured configuration of database system could lead to a potential data leak and hence the password of every registered user on the website is compromised, users who use the same password on multiple websites are affected the most The motivation for this paper comes from the fact that there is an overwhelming number of vulnerabilities in any application under development and every developer, experienced or not needs a starting point to patch these vulnerabilities that might have occurred in their application, this research provides the most common vulnerabilities which should be taken care of in any application and thus provide the much-needed starting point for developers. The objective of this paper is to design and develop a secure web application according to Open Web Application Security Project (OWASP) guidelines. I. INTRODUCTION A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface. A web application generally consists of three main parts – Front – End, Back – End and Database. For this paper, the front-end has been made using HTML with ejs, for back-end NodeJS has been used and for the database MySQL has been used.The front end is used to display the main content of the webpage, it is usually the only thing that the client sees once the site is visited. If the website is static then only the front end is required.HTML is used to form the layout of the whole page, CSS is used to give styling to the page, and JavaScript is used to give logic to the page. Websites having only the frontend are prone to Cross-Site Scripting (XSS) injection attacks. RESULTS |