USE OF “OWASP TOP 10” IN WEB APPLICATION SECURITY
USE OF “OWASP TOP 10” IN WEB APPLICATION SECURITY
Author(s): Nikola Nedeljković, Natalija Vugdelija, Nenad Kojić
Subject(s): Social Sciences, Economy
Published by: Udruženje ekonomista i menadžera Balkana
Keywords: Web security; Web attack; Weaknesses of the web application.
Summary/Abstract: Web application security vulnerabilities can lead to various attacks on users, some of which can have major consequences. It is important to point out the weaknesses that allow abuse, because often increased risk awareness is the first step in protecting web applications. Some of the most critical security risks that organizations face today have been analyzed and uncovered using OWASP Top 10. This paper presents concrete examples of attacks and abuse of web applications. Through the implementation and analysis of attacks on web applications, weaknesses that need to be eliminated in order to protect against potential new attacks are identified. Especially, suggestions to help protect web applications from each type of attack listed and described are provided.
- Page Range: 25-30
- Page Count: 6
- Publication Year: 2020
- Language: English
- Content File-PDF