Ramification of hustling the web application development

  • Authors

    • Daljit Kaur
    • Dr Parminder Kaur
    2018-05-29
    https://doi.org/10.14419/ijet.v7i2.30.13454
  • Flaws in Development, Security, Vulnerabilities, Web Applications, Web Development.
  • With the growth of web and Internet, every era of human life has been affected. People want to make their or their organization’s presence globally visible through this medium. Web applications and/or mobile apps are used for the purpose of making their recognition as well as to attract the clients worldwide. With the demand of putting the business or services online faster than anyone else, web applications are developed in hustle and under pressure by developers and most of the times they ignore the few essential activities for securing them from severe attacks, which may be a greater loss for the business. This work is an effort to understand the complex distributed environment of web applications and show the impact of husting the web development process.

     

     

  • References

    1. [1] World Development Indicators 2000. World Development Indica tors, Washington, DC. Retrieved from: https://openknowledge.worldbank.org/handle/10986/13828 on 13 January 2017.

      [2] Web application security statistics, 2008. Web Application Security Consortium. Retrieved From: http://projects.webappsec.org/w/page/13246989/webapplicationsecuritystatistics

      [3] Website Security Statistics Report ninth Edition, spring 2010. WhiteHat Security. Retrieved from https://www.whitehatsec.com/

      [4] Lomte,P., Rajesh, M. And Bhura,S.(2013). Survey of Different Web Application Attacks & Its Preventive Measures, IOSR Journal of Computer Engineering (IOSR-JCE), 14(5). 46-51.

      [5] Abusaimeh, H. and Shkoukani, M. (2012). Survey of Web Application and Internet Security Threats. International Journal of Computer Science and Network Security. 12 (12), 67-76.

      [6] Li, X., & Xue, Y. (2011). A survey on web application security. Nashville, TN USA. Retrieved from http://www.isis.vanderbilt.edu/node/4478 on February 1, 2014.

      [7] Lomte,P., Rajesh, M. and Bhura,S.(2013). Survey of Different Web Application Attacks & Its Preventive Measures, IOSR Journal of Computer Engineering (IOSR-JCE), 14(5). 46-51.

      [8] Chavan, S. B., & Meshram, B. B. (2013). Classification of web application vulnerabilities. International Journal of Engineering Science and Innovative Technology (IJESIT), 2(13), pp. 226-234.

      [9] Symantec. (2017). Internet Security Threat Report, Symantec,(22), retrieved from: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf

      [10] The Ten Most critical Web Application Security Risks, Open Web Application Security Project Top 10. Retrieved from http://www.owasp.org/

  • Downloads

  • How to Cite

    Kaur, D., & Parminder Kaur, D. (2018). Ramification of hustling the web application development. International Journal of Engineering & Technology, 7(2.30), 6-9. https://doi.org/10.14419/ijet.v7i2.30.13454