WEB ATTACKS AND DEFENSES

Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated s...

Full description

Bibliographic Details
Main Authors: Ammar A. Alobaidi, Najla B. Al Dabbagh
Format: Article
Language:Arabic
Published: College of Education for Pure Sciences 2023-06-01
Series:مجلة التربية والعلم
Subjects:
Online Access:https://edusj.mosuljournals.com/article_178268_06273bc9da983bfb2bca7334f0aab015.pdf
_version_ 1797816225031520256
author Ammar A. Alobaidi
Najla B. Al Dabbagh
author_facet Ammar A. Alobaidi
Najla B. Al Dabbagh
author_sort Ammar A. Alobaidi
collection DOAJ
description Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications.
first_indexed 2024-03-13T08:35:40Z
format Article
id doaj.art-082bca62c36e4c6fa45c3a9c18532994
institution Directory Open Access Journal
issn 1812-125X
2664-2530
language Arabic
last_indexed 2024-03-13T08:35:40Z
publishDate 2023-06-01
publisher College of Education for Pure Sciences
record_format Article
series مجلة التربية والعلم
spelling doaj.art-082bca62c36e4c6fa45c3a9c185329942023-05-30T23:24:19ZaraCollege of Education for Pure Sciencesمجلة التربية والعلم1812-125X2664-25302023-06-0132211412710.33899/edusj.2023.137855.1319178268WEB ATTACKS AND DEFENSESAmmar A. Alobaidi0Najla B. Al Dabbagh1Computer Science /College of Computer Sciences and Mathematics/ Mosul University/ IraqComputer Science /College of Computer Sciences and Mathematics/ Mosul University/ IraqBecause of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications. The process of providing data and data systems with appropriate procedural and sophisticated security safeguards is known as cybersecurity. Threats to cyber security are increasing at times. A flaw or weakness in a computer system, security tactics, internal controls, planning, or implementation that can compromise the security policy of a framework is known as a web vulnerability. The social, economic and political spheres of governments can be disrupted due to a vulnerability in the Internet, which can have an impact on the state. An effort is made to identify the defects and weaknesses while studying the weakness in order to take advantage of these weaknesses. The aim of this study is to identify the types of intrusions, find vulnerabilities, and review regulations for vulnerable systems detected in online applications.https://edusj.mosuljournals.com/article_178268_06273bc9da983bfb2bca7334f0aab015.pdfsecurity,,,،,؛web security,,,،,؛web attack,,,،,؛cybercrime,,,،,؛cybersecurity
spellingShingle Ammar A. Alobaidi
Najla B. Al Dabbagh
WEB ATTACKS AND DEFENSES
مجلة التربية والعلم
security,,
,،,؛web security,,
,،,؛web attack,,
,،,؛cybercrime,,
,،,؛cybersecurity
title WEB ATTACKS AND DEFENSES
title_full WEB ATTACKS AND DEFENSES
title_fullStr WEB ATTACKS AND DEFENSES
title_full_unstemmed WEB ATTACKS AND DEFENSES
title_short WEB ATTACKS AND DEFENSES
title_sort web attacks and defenses
topic security,,
,،,؛web security,,
,،,؛web attack,,
,،,؛cybercrime,,
,،,؛cybersecurity
url https://edusj.mosuljournals.com/article_178268_06273bc9da983bfb2bca7334f0aab015.pdf
work_keys_str_mv AT ammaraalobaidi webattacksanddefenses
AT najlabaldabbagh webattacksanddefenses