The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web techno...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Shaheed Zulfikar Ali Bhutto Institute of Science and Technology
2014-07-01
|
Series: | JISR on Computing |
Subjects: | |
Online Access: | https://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/138 |
_version_ | 1797742070781181952 |
---|---|
author | Muhammad Altaf Mukati Syed Muzammil Ali |
author_facet | Muhammad Altaf Mukati Syed Muzammil Ali |
author_sort | Muhammad Altaf Mukati |
collection | DOAJ |
description |
Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.
|
first_indexed | 2024-03-12T14:36:42Z |
format | Article |
id | doaj.art-e91533d9c82f498e920f65942827d6f2 |
institution | Directory Open Access Journal |
issn | 2412-0448 1998-4154 |
language | English |
last_indexed | 2024-03-12T14:36:42Z |
publishDate | 2014-07-01 |
publisher | Shaheed Zulfikar Ali Bhutto Institute of Science and Technology |
record_format | Article |
series | JISR on Computing |
spelling | doaj.art-e91533d9c82f498e920f65942827d6f22023-08-17T06:45:42ZengShaheed Zulfikar Ali Bhutto Institute of Science and TechnologyJISR on Computing2412-04481998-41542014-07-0112110.31645/.2014.12.1.9The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business ApplicationsMuhammad Altaf Mukati0Syed Muzammil Ali1Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Karachi, PakistanShaheed Zulfikar Ali Bhutto Institute of Science and Technology, Karachi Pakistan Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications. https://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/138Cyber securityWeb security |
spellingShingle | Muhammad Altaf Mukati Syed Muzammil Ali The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications JISR on Computing Cyber security Web security |
title | The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications |
title_full | The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications |
title_fullStr | The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications |
title_full_unstemmed | The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications |
title_short | The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications |
title_sort | vulnerability of cyber security and strategy to conquer the potential threats on business applications |
topic | Cyber security Web security |
url | https://jisrc.szabist.edu.pk/ojs/index.php/jisrc/article/view/138 |
work_keys_str_mv | AT muhammadaltafmukati thevulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications AT syedmuzammilali thevulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications AT muhammadaltafmukati vulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications AT syedmuzammilali vulnerabilityofcybersecurityandstrategytoconquerthepotentialthreatsonbusinessapplications |