Ramification of hustling the web application development
Keywords:Flaws in Development, Security, Vulnerabilities, Web Applications, Web Development.
With the growth of web and Internet, every era of human life has been affected. People want to make their or their organizationâ€™s presence globally visible through this medium. Web applications and/or mobile apps are used for the purpose of making their recognition as well as to attract the clients worldwide. With the demand of putting the business or services online faster than anyone else, web applications are developed in hustle and under pressure by developers and most of the times they ignore the few essential activities for securing them from severe attacks, which may be a greater loss for the business. This work is an effort to understand the complex distributed environment of web applications and show the impact of husting the web development process.
 World Development Indicators 2000. World Development Indica tors, Washington, DC. Retrieved from: https://openknowledge.worldbank.org/handle/10986/13828 on 13 January 2017.
 Web application security statistics, 2008. Web Application Security Consortium. Retrieved From: http://projects.webappsec.org/w/page/13246989/webapplicationsecuritystatistics
 Website Security Statistics Report ninth Edition, spring 2010. WhiteHat Security. Retrieved from https://www.whitehatsec.com/
 Lomte,P., Rajesh, M. And Bhura,S.(2013). Survey of Different Web Application Attacks & Its Preventive Measures, IOSR Journal of Computer Engineering (IOSR-JCE), 14(5). 46-51.
 Abusaimeh, H. and Shkoukani, M. (2012). Survey of Web Application and Internet Security Threats. International Journal of Computer Science and Network Security. 12 (12), 67-76.
 Li, X., & Xue, Y. (2011). A survey on web application security. Nashville, TN USA. Retrieved from http://www.isis.vanderbilt.edu/node/4478 on February 1, 2014.
 Lomte,P., Rajesh, M. and Bhura,S.(2013). Survey of Different Web Application Attacks & Its Preventive Measures, IOSR Journal of Computer Engineering (IOSR-JCE), 14(5). 46-51.
 Chavan, S. B., & Meshram, B. B. (2013). Classification of web application vulnerabilities. International Journal of Engineering Science and Innovative Technology (IJESIT), 2(13), pp. 226-234.
 Symantec. (2017). Internet Security Threat Report, Symantec,(22), retrieved from: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
 The Ten Most critical Web Application Security Risks, Open Web Application Security Project Top 10. Retrieved from http://www.owasp.org/
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).