.

Friday, May 10, 2019

Web Security Essay Example | Topics and Well Written Essays - 4000 words

sack up security - Essay ExampleWeb protection manages and secures weave traffic by sorting threats of web malware, blocking URLs containing inappropriate content, and prevents the acquittance of mystical data over protocols on the web. Attackers use the web to deliver viruses such as malware. A huge percentage of breaches involve crimes that target corporate information. Another challenge of brand impairment occurs when the contractors or employees make postings that are inappropriate to sites of social meshing. Therefore, the on-site contractors and employees expose an organization to legal uncertainties by tour sites containing inappropriate content. Consequently, the productivity of an organization will suffer if the contractors and the employees exceed the use of the web during working hours. Web security ensures that the confidential information and networks are available and secure. Also, it protects the networks coming from outside such as malware post over the web. W eb security enhances the web protection and reduces the legal exposure by blocking confine sites. Subsequently, it scans email of the internet and other web traffic that are outbound to reduce the loss of confidential data. It also prevents and breaks proliferation to protect the end users against application threats. Web security also chooses among hosted, appliance, and premises options for web filtering and web security. Table of Contents WEB SECURITY. 1 MEMORANDUM 1 ABSTRACT. 6 INTRODUCTION 6 reach 7 OBJECTIVES 8 FACTORS THAT CONTRIBUTE TO WEB SECURITY 8 Human and Technological Factors 9 The noesis of the user 9 The technology that is in use at that particular time 9 Tools for Security 9 The necessary tools available for security 9 SECURITY CAN BE ACHIEVED BY ADDRESSING 9 User and Technology Factors 10 Responsibility of the User 10 Relevance to Security 10 cherubic Development 11 Design 12 Visualization 12 HISTORY OF WEB SECURITY 12 History of Web Tools 13 Preventing SQL in jection 13 Creating awareness to web security 14 Tools to detect web attacks 14 Web versus desktop applications 15 Intelligent information systems 16 INTERNET CONTROLS 16 Intrusion Detection System 17 Signature-based network intrusion detection system 18 Analysis-based network intrusion detection system 18 Firewalls 19 Encryption program 19 Honey popts 19 CONCLUSION 20 REFERENCE 21 3.Singh, Brijendra and Agarwal, Pooja. Algorithm for Web Server Security IETE daybook of Research57.5 (Sep 2011) 413-422. 22 6.Hossain, Md Safaet and Hossain, Md Shazzad. Web Test Integration and Performance Evaluation of E-Commerce Web Sites International Journal of Computer Science and Information Security10.9 (Sep 2012) 65-69. 23 7.Serrhini, Mohammed. Moussa, Abdelazziz Ait. Home Users Security and the Web Browser Inbuilt Settings, simulation to Setup IT Automatically Journal of Computer Science9.2 (2013) 159-168. 23 9.Volkoviy, Andrei and Chekhov, Ilia. Use of Mobile Applications in Security and gu ard Systems Information & Security28.1 (2012) 146-153. 24 APPENDIX A. GLOSSARY 25 IT Systems These are secure systems developed and can mechanically detect threats and ensure that they are removed without the involvement of the user. 26 APPENDIX B. RESEARCH METHODS. 28 ABSTRACT. This final report discusses the topic of web security and some of the risks that internet users all over the world experience. everyplace the years, web security has grown to become a very crucial part of our daily life. This is shown by the manner in which most of the world population conducts their business (Alanazi, Fahad, &Mohamed, 2011 87). These include, doing bank transactions,

No comments:

Post a Comment