Title :
Web-Application Security: From Reactive to Proactive
Author :
Maguire, John R. ; Miller, H. Gilbert
Abstract :
Here´s a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application´s security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn´t envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack.
Keywords :
Internet; computer crime; computer network security; computer crime; developer envision; lower layer security control; proactive vulnerability; security attack; web application security; Assembly; Financial management; Guidelines; Knowledge management; Programming profession; Protection; Risk analysis; Risk management; Security; System testing; Information technology; security and privacy;
Journal_Title :
IT Professional
DOI :
10.1109/MITP.2010.117