SlideShare a Scribd company logo
DEPARTMENT OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY
R.Ramya Devi
I msc(cs)
TOPIC: WEB SECURITY
 Web Security is very important
nowadays. Websites are always prone to
security threats/risks. Web Security deals with
the security of data over the internet/network
or web or while it is being transferred to the
internet. For e.g. when you are transferring
data between client and server and you have
to protect that data that security of data is
your web security.
 A Threat is nothing but a possible event that
can damage and harm an information system.
Security Threat is defined as a risk that which,
can potentially harm Computer systems &
organizations. Whenever an Individual or an
Organization creates a website, they are
vulnerable to security attacks.
 Security attacks are mainly aimed at stealing
altering or destroying a piece of personal and
confidential information, stealing the hard
drive space, illegally accessing passwords. So
whenever the website you created is
vulnerable to security attacks then the attacks
are going to steal your data alter your data
destroy your personal information see your
confidential information and also it accessing
your password.
 Web security threats are constantly emerging
and evolving, but many threats consistently
appear at the top of the list of web security
threats. These include:
 Cross-site scripting (XSS)
 SQL Injection
 Phishing
 Ransomware
 Code Injection
 Viruses and worms
 Spyware
 Denial of Service
 Updated Software: You need to always
update your software. Hackers may be aware
of vulnerabilities in certain software, which
are sometimes caused by bugs and can be
used to damage your computer system and
steal personal data. Older versions of
software can become a gateway for hackers
to enter your network. Software makers soon
become aware of these vulnerabilities and will
fix vulnerable or exposed areas.
 Beware of SQL Injection: SQL Injection is
an attempt to manipulate your data or your
database by inserting a rough code into your
query. For e.g. somebody can send a query to
your website and this query can be a rough
code while it gets executed it can be used to
manipulate your database such as change
tables, modify or delete data or it can retrieve
important information also so, one should be
aware of the SQL injection attack.
 Cross-Site Scripting (XSS): XSS allows the
attackers to insert client-side script into web
pages. E.g. Submission of forms. It is a term
used to describe a class of attacks that allow
an attacker to inject client-side scripts into
other users’ browsers through a website. As
the injected code enters the browser from the
site, the code is reliable and can do things
like sending the user’s site authorization
cookie to the attacker.
 Error Messages: You need to be very careful
about error messages which are generated to
give the information to the users while users
access the website and some error messages
are generated due to one or another reason
and you should be very careful while
providing the information to the users. For
e.g. login attempt – If the user fails to login
the error message should not let the user
know which field is incorrect: Username or
Password.
 Data Validation: Data validation is the proper
testing of any input supplied by the user or
application. It prevents improperly created
data from entering the information system.
Validation of data should be performed on
both server-side and client-side. If we
perform data validation on both sides that
will give us the authentication. Data
validation should occur when data is received
from an outside party, especially if the data is
from untrusted sources.
 Password: Password provides the first line of
defense against unauthorized access to your
device and personal information. It is necessary
to use a strong password. Hackers in many cases
use sophisticated software that uses brute force
to crack passwords. Passwords must be complex
to protect against brute force. It is good to
enforce password requirements such as a
minimum of eight characters long must including
uppercase letters, lowercase letters, special
characters, and numerals.

 Web security refers to protecting networks
and computer systems from damage to or the
theft of software, hardware, or data. It
includes protecting computer systems from
misdirecting or disrupting the services they
are designed to provide.
 Web security refers to protecting networks and
computer systems from damage to or the theft of
software, hardware, or data. It includes
protecting computer systems from misdirecting
or disrupting the services they are designed to
provide.
 Web security is synonymous
with cybersecurity and also covers website
security, which involves protecting websites from
attacks. It includes cloud security and web
application security, which defend cloud services
and web-based applications, respectively.
Protection of a virtual private network (VPN) also
falls under the web security umbrella.
cryptography .pptx

More Related Content

PDF
Website Security: A Guide to Defending Your Website
WebGuru Infosystems Pvt. Ltd.
 
PPTX
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
PPT
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
PDF
OWASPTop 10
InnoTech
 
PPTX
Network security
Ashish Gaurkhede
 
PPT
Secure code practices
Hina Rawal
 
PPTX
Common Security Issues on the Internet
Bretz Harllynne Moltio
 
PPTX
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
Website Security: A Guide to Defending Your Website
WebGuru Infosystems Pvt. Ltd.
 
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
OWASPTop 10
InnoTech
 
Network security
Ashish Gaurkhede
 
Secure code practices
Hina Rawal
 
Common Security Issues on the Internet
Bretz Harllynne Moltio
 
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 

Similar to cryptography .pptx (20)

PPT
Computer Security
Vaibhavi Patel
 
PPT
Computer Security
Vaibhavi Patel
 
PDF
Web application sec_3
vhimsikal
 
PPTX
Unit 5.pptx
Rajanarayanan subramanian
 
PPT
Information security
Sathyanarayana Panduranga
 
PPTX
Secure Software Engineering
Rohitha Liyanagama
 
PPTX
Tips for web security
kareowebtech
 
PPTX
Tips for web security
kareowebtech
 
PDF
Problems with parameters b sides-msp
Mike Saunders
 
PDF
Ethical Hacking and Cyber Security
Neeraj Negi
 
PDF
Sip 140208055023-phpapp02
mark scott
 
PPT
Security for database administrator to enhance security
ssuser20fcbe
 
PDF
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
PPTX
The Whys and Wherefores of Web Security – by United Security Providers
United Security Providers AG
 
PDF
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
PPTX
Presentation on Web Attacks
Vivek Sinha Anurag
 
PPTX
State of the information security nation
SensePost
 
PPTX
Data protection and security
samina khan
 
PPT
Secure development
Ahmed Gamil
 
Computer Security
Vaibhavi Patel
 
Computer Security
Vaibhavi Patel
 
Web application sec_3
vhimsikal
 
Information security
Sathyanarayana Panduranga
 
Secure Software Engineering
Rohitha Liyanagama
 
Tips for web security
kareowebtech
 
Tips for web security
kareowebtech
 
Problems with parameters b sides-msp
Mike Saunders
 
Ethical Hacking and Cyber Security
Neeraj Negi
 
Sip 140208055023-phpapp02
mark scott
 
Security for database administrator to enhance security
ssuser20fcbe
 
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
The Whys and Wherefores of Web Security – by United Security Providers
United Security Providers AG
 
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
Presentation on Web Attacks
Vivek Sinha Anurag
 
State of the information security nation
SensePost
 
Data protection and security
samina khan
 
Secure development
Ahmed Gamil
 
Ad

More from RRamyaDevi (6)

PPTX
Ramya ppt.pptx
RRamyaDevi
 
PPTX
python.pptx
RRamyaDevi
 
PPTX
RDos.pptx
RRamyaDevi
 
PPTX
COMPILER DESIGN
RRamyaDevi
 
PPTX
ADVANCED JAVA PROGRAMME
RRamyaDevi
 
PPTX
Data structure algorithm
RRamyaDevi
 
Ramya ppt.pptx
RRamyaDevi
 
python.pptx
RRamyaDevi
 
RDos.pptx
RRamyaDevi
 
COMPILER DESIGN
RRamyaDevi
 
ADVANCED JAVA PROGRAMME
RRamyaDevi
 
Data structure algorithm
RRamyaDevi
 
Ad

Recently uploaded (20)

PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
CDH. pptx
AneetaSharma15
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Basics and rules of probability with real-life uses
ravatkaran694
 

cryptography .pptx

  • 1. DEPARTMENT OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY R.Ramya Devi I msc(cs)
  • 3.  Web Security is very important nowadays. Websites are always prone to security threats/risks. Web Security deals with the security of data over the internet/network or web or while it is being transferred to the internet. For e.g. when you are transferring data between client and server and you have to protect that data that security of data is your web security.
  • 4.  A Threat is nothing but a possible event that can damage and harm an information system. Security Threat is defined as a risk that which, can potentially harm Computer systems & organizations. Whenever an Individual or an Organization creates a website, they are vulnerable to security attacks.
  • 5.  Security attacks are mainly aimed at stealing altering or destroying a piece of personal and confidential information, stealing the hard drive space, illegally accessing passwords. So whenever the website you created is vulnerable to security attacks then the attacks are going to steal your data alter your data destroy your personal information see your confidential information and also it accessing your password.
  • 6.  Web security threats are constantly emerging and evolving, but many threats consistently appear at the top of the list of web security threats. These include:
  • 7.  Cross-site scripting (XSS)  SQL Injection  Phishing  Ransomware  Code Injection  Viruses and worms  Spyware  Denial of Service
  • 8.  Updated Software: You need to always update your software. Hackers may be aware of vulnerabilities in certain software, which are sometimes caused by bugs and can be used to damage your computer system and steal personal data. Older versions of software can become a gateway for hackers to enter your network. Software makers soon become aware of these vulnerabilities and will fix vulnerable or exposed areas.
  • 9.  Beware of SQL Injection: SQL Injection is an attempt to manipulate your data or your database by inserting a rough code into your query. For e.g. somebody can send a query to your website and this query can be a rough code while it gets executed it can be used to manipulate your database such as change tables, modify or delete data or it can retrieve important information also so, one should be aware of the SQL injection attack.
  • 10.  Cross-Site Scripting (XSS): XSS allows the attackers to insert client-side script into web pages. E.g. Submission of forms. It is a term used to describe a class of attacks that allow an attacker to inject client-side scripts into other users’ browsers through a website. As the injected code enters the browser from the site, the code is reliable and can do things like sending the user’s site authorization cookie to the attacker.
  • 11.  Error Messages: You need to be very careful about error messages which are generated to give the information to the users while users access the website and some error messages are generated due to one or another reason and you should be very careful while providing the information to the users. For e.g. login attempt – If the user fails to login the error message should not let the user know which field is incorrect: Username or Password.
  • 12.  Data Validation: Data validation is the proper testing of any input supplied by the user or application. It prevents improperly created data from entering the information system. Validation of data should be performed on both server-side and client-side. If we perform data validation on both sides that will give us the authentication. Data validation should occur when data is received from an outside party, especially if the data is from untrusted sources.
  • 13.  Password: Password provides the first line of defense against unauthorized access to your device and personal information. It is necessary to use a strong password. Hackers in many cases use sophisticated software that uses brute force to crack passwords. Passwords must be complex to protect against brute force. It is good to enforce password requirements such as a minimum of eight characters long must including uppercase letters, lowercase letters, special characters, and numerals. 
  • 14.  Web security refers to protecting networks and computer systems from damage to or the theft of software, hardware, or data. It includes protecting computer systems from misdirecting or disrupting the services they are designed to provide.
  • 15.  Web security refers to protecting networks and computer systems from damage to or the theft of software, hardware, or data. It includes protecting computer systems from misdirecting or disrupting the services they are designed to provide.  Web security is synonymous with cybersecurity and also covers website security, which involves protecting websites from attacks. It includes cloud security and web application security, which defend cloud services and web-based applications, respectively. Protection of a virtual private network (VPN) also falls under the web security umbrella.