PDF (الإنجليزية)

الكلمات المفتاحية

Security

،
؛Web security
؛Web Attack
؛Cybercrime
؛Cybersecurity

الملخص

Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications.
https://doi.org/10.33899/edusj.2023.137855.1319
  PDF (الإنجليزية)