Analysis of vulnerabilities of Web-applications and methods of their elimination: applied aspects

- Гриб'юк, О.О. (orcid.org/0000-0003-3402-0520) and Костюк, Є. (2021) Analysis of vulnerabilities of Web-applications and methods of their elimination: applied aspects In: Вища освіта - студентська наука - сучасне суспільство: напрями розвитку: матеріали Всеукр. наук.-практ. Інтернет-конф. . ISTU, м. Київ, Україна, pp. 87-89.

[img] Text
Hrybiuk_Kostiuk_T5+.pdf - Published Version
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (496kB) | Request a copy

Abstract

During the experimental study, the analysis of the use and evaluation of the necessary characteristics in the context of the developed standard scenarios of web-vulnerabilities (fixed time to identify vulnerabilities, the level of training of experts, awareness of the project taking into account its features, access to web- applications, tools needed to identify vulnerabilities, assess the "potential" of possible attacks in the process of executing an attack scenario based on guidelines. The purpose of the study was to reduce the time of vulnerability analysis in the certification tests requirements for secure storage of information, including the use of standard methods for analyzing vulnerabilities in web-applications. to overcome three different vectors of viral attacks. Obviously, the protection of each server requires the use of a specific port to support a specific service. amplification with simultaneous work on it of concrete service. It is advisable to restrict access to services to third-party users other than personalized users. Even when restricting the use of a load balancer, the use of a reverse proxy is recommended. A reverse proxy relays user requests from the external environment to one or more servers that are logically located on the internal network. Typically, reverse proxies are located in front of web servers and are used as a firewall at the application level to balance the network load between multiple web servers and increase their security.

Item Type: Book Section
Keywords: computer-oriented methodical system of research training; mathematical modeling, immersive technologies,data security
Subjects: Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.3 Computer hardware
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.5 Human-computer interaction. Man-machine interface. User interface. User environment
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.7 Computer communication. Computer networks > 004.78 Online computing systems for specific use
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.9 ІКТ ( Application-oriented computer-based techniques ) > 004.94 Simulation
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 5 Мathematics. natural sciences > 51 Mathematics
Divisions: Institute for Digitalisation of Education > Department of Technologies of Open Learning Environment
Depositing User: Старший науковий співробітник О.О. Гриб'юк
Date Deposited: 06 Sep 2021 14:39
Last Modified: 06 Sep 2021 14:39
URI: https://lib.iitta.gov.ua/id/eprint/726293

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item