- Гриб'юк, О.О. (orcid.org/0000-0003-3402-0520) and Костюк, Є. (2021) Analysis of vulnerabilities of Web-applications and methods of their elimination: applied aspects In: Вища освіта - студентська наука - сучасне суспільство: напрями розвитку: матеріали Всеукр. наук.-практ. Інтернет-конф. . ISTU, м. Київ, Україна, pp. 87-89.
Text
Hrybiuk_Kostiuk_T5+.pdf - Published Version Restricted to Registered users only Available under License Creative Commons Attribution Non-commercial Share Alike. Download (496kB) | Request a copy |
Abstract
During the experimental study, the analysis of the use and evaluation of the necessary characteristics in the context of the developed standard scenarios of web-vulnerabilities (fixed time to identify vulnerabilities, the level of training of experts, awareness of the project taking into account its features, access to web- applications, tools needed to identify vulnerabilities, assess the "potential" of possible attacks in the process of executing an attack scenario based on guidelines. The purpose of the study was to reduce the time of vulnerability analysis in the certification tests requirements for secure storage of information, including the use of standard methods for analyzing vulnerabilities in web-applications. to overcome three different vectors of viral attacks. Obviously, the protection of each server requires the use of a specific port to support a specific service. amplification with simultaneous work on it of concrete service. It is advisable to restrict access to services to third-party users other than personalized users. Even when restricting the use of a load balancer, the use of a reverse proxy is recommended. A reverse proxy relays user requests from the external environment to one or more servers that are logically located on the internal network. Typically, reverse proxies are located in front of web servers and are used as a firewall at the application level to balance the network load between multiple web servers and increase their security.
Downloads
Downloads per month over past year
Actions (login required)
View Item |