Affiliation:
1. Amity University, Jaipur, India
Abstract
Data needs to be protected first and foremost these days. The biggest threat to any organization is when someone has access to its data, credentials, or sensitive information. Every firm is establishing its services online as we move toward a digital future, and for those services, data loss, disruption, or corruption pose a serious hazard . Web apps are becoming more and more popular because of their ability to meet both consumer and commercial needs. The most effective and efficient way to deliver business services to stakeholders is now possible with web applications. Many services are now offered through web apps, and the efficiency of those services is gauged by the speed at which they are processed and their informational capabilities. However, because of incorrect validation, those services may also be threatened. Currently, cyber-attacks are a serious concern for any global digital transition. This chapter presents a case study on a critical criteria vulnerability named RCE.
Reference15 articles.
1. SQLi vulnerabilty in education sector websites of Bangladesh
2. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers
3. CVE-2022-30190. (n.d.). https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support- diagnostic-tool-vulnerability/
4. HomerJ.ManhattanK.OuX.SchmidtD. (2009). A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks. Citeseer.
5. Root cause analysis of session management and broken authentication vulnerabilities;D.Huluka;World Congress on Internet Security (WorldCIS-2012),2012
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献