Vulnerabilities and Countermeasures in Web Applications

Madhuri k

Abstract


Web applications evolve throughout time to provide a communication environment for users to communicate, but they can introduce vulnerabilities, even with minor programming flaws. As a result, security should be a top priority in online applications. There are several types of vulnerabilities that can occur while dealing with online apps, and countermeasures must be developed to deal with them. This article goes over the many dangers that may arise in online applications, including examples, and offers a strategy for preventing them. The research also uses the EDI matrix to classify the various online application vulnerabilities (exploitability, detection, and risk).

Keywords


Security, Threats, Vulnerability, Web Applications

Full Text:

PDF

References


Albarran AB (2002) Media Economics: Understanding Markets, Industries and Concepts, 2nd ed. Iowa: Iowa State Press.

Albarran AB (2010) The Media Economy. New York: Routledge.

Arrese A and Albarran AB (2003) Time and media markets: Summary and research agenda. In: Albarran AB and Arrese A (eds) Time and Media Markets. London: Lawrence Erlbaum Associates Publishers, pp. 161–171.

Becker G (1965) A theory of the allocation of time. Economic Journal 75(3): 493–517.

Boczkowsi PJ (2010a) The consumption of online news at work. Information, Communication and Society 13(4): 470–484.

Boczkowsi PJ (2010b) News at Work: Imitation in an Age of Information Abundance. Chicago: The University of Chicago Press.

Chan T and Goldthorpe HJ (2007) Social status and newspaper readership. American Journal of Sociology 112(4): 1095–1134.

Chyi IH (2006) Re-examining the market relation between online and print news- paper: The case of Hong Kong. In: Li X (ed.) Internet Newspapers: The Making of a Mainstream Medium. New Jersey: Lawrence Erlbaum Associates Publishers, pp. 193–208.

Chyi IH and Yang MJ (2009) Is online news an inferior good? Examining the economic nature of online news among users. Journalism and Mass Communication Quarterly 86(3): 594–612.

Converse PE (1968) Time budgets. In: Sills D (ed.) International Encyclopedia of the Social Sciences. New York: Macmillan, pp. 42–47.

Dayan D and Katz E (1992) Media Events: The Live Broadcasting of History. Cambridge, MA: Harvard University Press.

De Grazia S (1962) Of Time, Work, and Leisure. New York: Twentieth Century Fund.

Dimmick J, Chen Y and Li Z (2004) Competition between the Internet and traditional news media: The gratification-opportunities niche dimension. Journal of Media Economics 17(1): 19–33.

Dimmick J and Albarran AB (1994) The role of gratification opportunities in determining media preference. Mass Communication Review 21: 223–235.

Jiwani, N., & Gupta, K. (2019). Comparison of Various Tools and Techniques used for Project Risk Management. International Journal of Machine Learning for Sustainable Development, 1(1), 51-58.

Dillman DA (2007) Mail and Internet Surveys: The Tailored Design Method, 2nd ed. Hoboken, NJ: Wiley.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 International Journal of Machine Learning for Sustainable Development

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Impact Factor : 

JCR Impact Factor: 5.9 (2020)

JCR Impact Factor: 6.1 (2021)

JCR Impact Factor: 6.7 (2022)

JCR Impact Factor: 7.6 (2023)

JCR Impact Factor: 8.6 (2024)

JCR Impact Factor: Under Evaluation (2025)

A Double-Blind Peer-Reviewed Refereed Journal