The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications

Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web techno...

Full description

Bibliographic Details
Main Authors: Muhammad Altaf Mukati, Syed Muzammil Ali
Format: Article
Language:English
Published: Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 2014-07-01
Series:JISR on Computing
Subjects:
Online Access:https://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/138
_version_ 1797742070781181952
author Muhammad Altaf Mukati
Syed Muzammil Ali
author_facet Muhammad Altaf Mukati
Syed Muzammil Ali
author_sort Muhammad Altaf Mukati
collection DOAJ
description Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.
first_indexed 2024-03-12T14:36:42Z
format Article
id doaj.art-e91533d9c82f498e920f65942827d6f2
institution Directory Open Access Journal
issn 2412-0448
1998-4154
language English
last_indexed 2024-03-12T14:36:42Z
publishDate 2014-07-01
publisher Shaheed Zulfikar Ali Bhutto Institute of Science and Technology
record_format Article
series JISR on Computing
spelling doaj.art-e91533d9c82f498e920f65942827d6f22023-08-17T06:45:42ZengShaheed Zulfikar Ali Bhutto Institute of Science and TechnologyJISR on Computing2412-04481998-41542014-07-0112110.31645/.2014.12.1.9The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business ApplicationsMuhammad Altaf Mukati0Syed Muzammil Ali1Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Karachi, PakistanShaheed Zulfikar Ali Bhutto Institute of Science and Technology, Karachi Pakistan Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications. https://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/138Cyber securityWeb security
spellingShingle Muhammad Altaf Mukati
Syed Muzammil Ali
The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
JISR on Computing
Cyber security
Web security
title The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
title_full The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
title_fullStr The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
title_full_unstemmed The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
title_short The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
title_sort vulnerability of cyber security and strategy to conquer the potential threats on business applications
topic Cyber security
Web security
url https://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/138
work_keys_str_mv AT muhammadaltafmukati thevulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications
AT syedmuzammilali thevulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications
AT muhammadaltafmukati vulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications
AT syedmuzammilali vulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications