96
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Towards an Understanding of Web Application Security Threats and Incidents

Pages 54-69 | Published online: 10 Sep 2014
 

Abstract

This paper examines a variety of sources that provide web application security vulnerabilities and incident data. In particular, the research tracks the impact of SQL Injection, Cross-Site Scripting and Cross-Site Request Forgery vulnerabilities. A comparison of vulnerability data versus attacks that have actually resulted in data compromises is studied to determine how the type of vulnerabilities relate to actual methods used to steal data. The paper concludes with recommendations for more secure web applications.

Additional information

Notes on contributors

Gerhard Steinke

Gerhard Steinke completed his doctoral work at the University of Passau in Germany. He has taught Information Systems and Information Security at Seattle Pacific University for the last 20 years. In addition, he has consulted for organizations such as Boeing, Microsoft, AT&T Wireless and the State of Washington. He has provided seminars not only in the US, but also in Mexico, Malaysia and Romania.

Emanuel Tundrea

Emanuel Tundrea completed his doctoral work at the University Polytechnic of Timisoara in Romania. He has taught Management Information Systems at Emanuel University for the last 5 years with a focus on Databases and Software Engineering. He was part of the Object Software Component research group at the 13S Lab in Sophia-Antipolis in France.

Kenmoro Kelly

Kenmoro Kelly completed his Master’s degree in Information Systems Management at Seattle Pacific University. His research interest lies in the area of helping organizations manage technology risks.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.