TITLE

A Growing Web's Harder To Secure

AUTHOR(S)
Dumiak, Michael
PUB. DATE
March 2007
SOURCE
Bank Technology News;Mar2007, Vol. 20 Issue 3, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the risk faced by corporations as Web 2.0 applications become widespread in the U.S. It states that the increased service of the applications and the richness of Web sites will create more vectors for attack. A report of Net Square founder Shreeraj Shah illustrates the confusions of identifying application logic in the new rich interfaces with complex scripts. Due to these vulnerabilities, the author suggests the importance of basic approach than relying on software fixes.
ACCESSION #
24566868

 

Related Articles

  • Your way, right away on the Web. Borck, James R. // InfoWorld;7/2/2001, Vol. 23 Issue 27, p32 

    Focuses on the use of dynamic content acceleration software to speed up personalized Web-content delivery and attract online customers. How a Web page can be both reusable and tailored to an individual user; Key features of the PreLoader 3.0 software from Chutney Technologies.

  • ISQL-IDPS: Intelligent SQL-Injection Detection and Prevention System. Kadirvelu, Selvamani; Arputharaj, Kannan // European Journal of Scientific Research;Mar2011, Vol. 51 Issue 2, p222 

    In many applications, SQL injection attacks are becoming serious threat to the integrity and security of web database systems. These types of attacks are vulnerable since the queries provided by the users are modified by the unethical users and hence they make the systems to execute their own...

  • NET EXPECTATIONS. Erickson, Jim // Information Management (1521-2912);Jan/Feb2010, Vol. 20 Issue 1, p16 

    The article discusses the meaning of a Web data service economy for business. It highlights the roles of Web and cloud computing in enabling a kind of data economy where data are accessed, paid, and used in a system that has value and currency to it. It discusses how application programming...

  • Standards target categorization. Rapoza, Jim // eWeek;7/15/2002, Vol. 19 Issue 28, p39 

    Presents several standards for Internet document content categorization. Resource Description Framework for defining metadata of Internet documents; Application of semantic concepts to documents using DARPA Agent Markup Language (DAML); Features of DAML+Ontology Inference Layer.

  • Specification of a Model of Honeypot Attack based on Raised Data. Oumtanaga, Souleymane; Kimou, Prosper; Kevin, Kouadio Gaza // Enformatika;2006, Vol. 17, p207 

    The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours....

  • The botnet world is booming. Messmer, Ellen // Network World;7/13/2009, Vol. 26 Issue 23, p12 

    The article discusses the claims of the author that botnet attacks are flourishing globally. She cites the attacks made to the to U.S. and South Korean government websites by an unidentified attacker. ShadowServer Foundation claims that the number of identified botnet attacks reached to 3,500 as...

  • Is Your PC Bot-Infested? Here's How to Tell. Vamosi, Robert // PCWorld;Oct2009, Vol. 27 Issue 10, p45 

    The article discusses how to determine that a personal computer (PC) is infected by botnets. Ways a PC can become infected by a botnet include visiting a web site and download tainted code disguised as a video, visiting a site that has been compromised, or through a traditional virus or other...

  • A Survey of Phishing Attack Techniques. Chawla, Minal; Singh Chouhan, Siddarth // International Journal of Computer Applications;May2014, Vol. 93, p32 

    Now in a day's phishing is a special type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, transaction or password data to what they think is their service provider's website. Phishing has two techniques, deceptive...

  • 'Pharming': A New Cyberthreat.  // BizEd;Jul/Aug2005, Vol. 4 Issue 5, p55 

    Reports on the existence of a new cyber threat called Pharming, which takes advantage of the Web site's own address system to trick users. Ability to reroute domain name system information to fake Web site pages; Potential in infecting spyware sent via e-mailed virus; Recommendations to avoid...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics