Project Title: "Detection of Security Vulnerabilities in A Web Application Specifically On An E-Commerce Website."
The document discusses a project to detect security vulnerabilities on an e-commerce website. It notes that while Java provides some security features, it does not ensure complete protection against attacks. The types of vulnerabilities have changed over time, with buffer overflows previously common but now sites are more vulnerable to cross-site scripting and SQL injections. The project will focus on security issues throughout development and cover Java security as well as vulnerabilities and secure programming techniques. It will also discuss detecting and preventing attacks by analyzing input data.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
29 views1 page
Project Title: "Detection of Security Vulnerabilities in A Web Application Specifically On An E-Commerce Website."
The document discusses a project to detect security vulnerabilities on an e-commerce website. It notes that while Java provides some security features, it does not ensure complete protection against attacks. The types of vulnerabilities have changed over time, with buffer overflows previously common but now sites are more vulnerable to cross-site scripting and SQL injections. The project will focus on security issues throughout development and cover Java security as well as vulnerabilities and secure programming techniques. It will also discuss detecting and preventing attacks by analyzing input data.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1
Project Title: Detection of Security Vulnerabilities in a Web
Application specifically on an E-Commerce website
A!ST"ACT Several inbuilt security features are directly offered by the Java programming language along with various characteristics supplied by several securities relevant APIs and implementations. Hence, directly choosing Java will not ensure complete security against severe secrecy attacks, integrity or availability attacks. he scenarios of security vulnerabilities are changing fiercely in the past few decades. Although string format violations and overflowing of buffer memory resulted in a huge section of all e!ploited susceptibilities during late s"#$%s, the entire scenario started too diverse in the new millennium&s latter years. 'sually the applications based on (eb were becoming flashier, familiar overflow of buffer have been reduced by the vulnerabilities of (eb application like cross)site scripting and S*+ in,ections intrusions. Such vulnerabilities are mainly responsible for a slew of attacks across big financial institutions, e)commerce sites, and other sites, causing millions of dollars in amends. -umerous security issues needs to be focused and implemented during the entire software development process, entirely free from the selected programming language. It covers all the facets of .Java Security/ and then consider the numerous .vulnerabilities/ 0 1secure programming techni2ues/ which should be acknowledged when Java programming comes in action. Several vulnerabilities classifications and the corresponding intrusions are covered along with some allay 3mitigation4 techni2ues. he report discusses the input data causing attack i.e. detection and how to prevent it i.e. prevention simultaneously. #eywor$s: (eb security, (eb vulnerabilities, 5ulnerability Analysis, (eb threats, etc.