Verification of Web Applications vulnerabilities /
Mahmoud Salah Mohamed Mubarak
Verification of Web Applications vulnerabilities / تحقيق نقاط الضعف في تطبيقات الويب Mahmoud Salah Mohamed Mubarak ; Supervised Akram Salah , Fatma A. El-Licy - Cairo : Mahmoud Salah Mohamed Mubarak , 2014 - 116 Leaves : charts ; 30cm
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences
Web security issues play an important role in the development of real life web systems. Malicious attacks of the web based systems, usually, inflect damages and losses in finance capitals and may, even, compromise the reputation of those institutes under attack. Web security issues include Buffer overflow, Cookie poisoning, SQL injection, Cross Site Scripting, Bypass Restrictions on Input Choices, CGI Parameters and Hidden field manipulation. Those vulnerabilities can be discovered by applying software testing techniques. The discovery of vulnerability in given software, would, normally, assist in rectifying the software as well as adjusting the design and implementation for better practice to avoid such vulnerability. Generally, white box testing techniques are adopted to expose these types of vulnerabilities. Software testing techniques are adopted, not only, to guarantee certain level of fault coverage, but also, to ensure security of the programs
Verification Vulnerabilities Web
Verification of Web Applications vulnerabilities / تحقيق نقاط الضعف في تطبيقات الويب Mahmoud Salah Mohamed Mubarak ; Supervised Akram Salah , Fatma A. El-Licy - Cairo : Mahmoud Salah Mohamed Mubarak , 2014 - 116 Leaves : charts ; 30cm
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences
Web security issues play an important role in the development of real life web systems. Malicious attacks of the web based systems, usually, inflect damages and losses in finance capitals and may, even, compromise the reputation of those institutes under attack. Web security issues include Buffer overflow, Cookie poisoning, SQL injection, Cross Site Scripting, Bypass Restrictions on Input Choices, CGI Parameters and Hidden field manipulation. Those vulnerabilities can be discovered by applying software testing techniques. The discovery of vulnerability in given software, would, normally, assist in rectifying the software as well as adjusting the design and implementation for better practice to avoid such vulnerability. Generally, white box testing techniques are adopted to expose these types of vulnerabilities. Software testing techniques are adopted, not only, to guarantee certain level of fault coverage, but also, to ensure security of the programs
Verification Vulnerabilities Web