0% found this document useful (0 votes)
29 views1 page

Project Title: "Detection of Security Vulnerabilities in A Web Application Specifically On An E-Commerce Website."

The document discusses a project to detect security vulnerabilities on an e-commerce website. It notes that while Java provides some security features, it does not ensure complete protection against attacks. The types of vulnerabilities have changed over time, with buffer overflows previously common but now sites are more vulnerable to cross-site scripting and SQL injections. The project will focus on security issues throughout development and cover Java security as well as vulnerabilities and secure programming techniques. It will also discuss detecting and preventing attacks by analyzing input data.

Uploaded by

Rachini Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views1 page

Project Title: "Detection of Security Vulnerabilities in A Web Application Specifically On An E-Commerce Website."

The document discusses a project to detect security vulnerabilities on an e-commerce website. It notes that while Java provides some security features, it does not ensure complete protection against attacks. The types of vulnerabilities have changed over time, with buffer overflows previously common but now sites are more vulnerable to cross-site scripting and SQL injections. The project will focus on security issues throughout development and cover Java security as well as vulnerabilities and secure programming techniques. It will also discuss detecting and preventing attacks by analyzing input data.

Uploaded by

Rachini Pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Project Title: Detection of Security Vulnerabilities in a Web

Application specifically on an E-Commerce website


A!ST"ACT
Several inbuilt security features are directly offered by the Java programming language along
with various characteristics supplied by several securities relevant APIs and implementations.
Hence, directly choosing Java will not ensure complete security against severe secrecy attacks,
integrity or availability attacks. he scenarios of security vulnerabilities are changing fiercely in
the past few decades. Although string format violations and overflowing of buffer memory
resulted in a huge section of all e!ploited susceptibilities during late s"#$%s, the entire scenario
started too diverse in the new millennium&s latter years.
'sually the applications based on (eb were becoming flashier, familiar overflow of buffer have
been reduced by the vulnerabilities of (eb application like cross)site scripting and S*+
in,ections intrusions. Such vulnerabilities are mainly responsible for a slew of attacks across big
financial institutions, e)commerce sites, and other sites, causing millions of dollars in amends.
-umerous security issues needs to be focused and implemented during the entire software
development process, entirely free from the selected programming language. It covers all the
facets of .Java Security/ and then consider the numerous .vulnerabilities/ 0 1secure
programming techni2ues/ which should be acknowledged when Java programming comes in
action.
Several vulnerabilities classifications and the corresponding intrusions are covered along with
some allay 3mitigation4 techni2ues. he report discusses the input data causing attack i.e.
detection and how to prevent it i.e. prevention simultaneously.
#eywor$s: (eb security, (eb vulnerabilities, 5ulnerability Analysis, (eb threats, etc.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy