WEB ATTACKS AND DEFENSES
Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated s...
Main Authors: | , |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
College of Education for Pure Sciences
2023-06-01
|
Series: | مجلة التربية والعلم |
Subjects: | |
Online Access: | https://edusj.mosuljournals.com/article_178268_06273bc9da983bfb2bca7334f0aab015.pdf |
_version_ | 1797816225031520256 |
---|---|
author | Ammar A. Alobaidi Najla B. Al Dabbagh |
author_facet | Ammar A. Alobaidi Najla B. Al Dabbagh |
author_sort | Ammar A. Alobaidi |
collection | DOAJ |
description | Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications. |
first_indexed | 2024-03-13T08:35:40Z |
format | Article |
id | doaj.art-082bca62c36e4c6fa45c3a9c18532994 |
institution | Directory Open Access Journal |
issn | 1812-125X 2664-2530 |
language | Arabic |
last_indexed | 2024-03-13T08:35:40Z |
publishDate | 2023-06-01 |
publisher | College of Education for Pure Sciences |
record_format | Article |
series | مجلة التربية والعلم |
spelling | doaj.art-082bca62c36e4c6fa45c3a9c185329942023-05-30T23:24:19ZaraCollege of Education for Pure Sciencesمجلة التربية والعلم1812-125X2664-25302023-06-0132211412710.33899/edusj.2023.137855.1319178268WEB ATTACKS AND DEFENSESAmmar A. Alobaidi0Najla B. Al Dabbagh1Computer Science /College of Computer Sciences and Mathematics/ Mosul University/ IraqComputer Science /College of Computer Sciences and Mathematics/ Mosul University/ IraqBecause of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications.https://edusj.mosuljournals.com/article_178268_06273bc9da983bfb2bca7334f0aab015.pdfsecurity,,,،,؛web security,,,،,؛web attack,,,،,؛cybercrime,,,،,؛cybersecurity |
spellingShingle | Ammar A. Alobaidi Najla B. Al Dabbagh WEB ATTACKS AND DEFENSES مجلة التربية والعلم security,, ,،,؛web security,, ,،,؛web attack,, ,،,؛cybercrime,, ,،,؛cybersecurity |
title | WEB ATTACKS AND DEFENSES |
title_full | WEB ATTACKS AND DEFENSES |
title_fullStr | WEB ATTACKS AND DEFENSES |
title_full_unstemmed | WEB ATTACKS AND DEFENSES |
title_short | WEB ATTACKS AND DEFENSES |
title_sort | web attacks and defenses |
topic | security,, ,،,؛web security,, ,،,؛web attack,, ,،,؛cybercrime,, ,،,؛cybersecurity |
url | https://edusj.mosuljournals.com/article_178268_06273bc9da983bfb2bca7334f0aab015.pdf |
work_keys_str_mv | AT ammaraalobaidi webattacksanddefenses AT najlabaldabbagh webattacksanddefenses |