( ISSN 2277 - 9809 (online) ISSN 2348 - 9359 (Print) ) New DOI : 10.32804/IRJMSH

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 159    Submit Your Rating     Cite This   Download        Certificate

WHY WEB APPLICATION SECURITY IS CRUCIAL

    1 Author(s):  KUSUM LATA BHARTI

Vol -  3, Issue- 1 ,         Page(s) : 48 - 51  (2012 ) DOI : https://doi.org/10.32804/IRJMSH

Abstract

Many organisations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications. As this report shows, organisations that use the tools available for improving the security of the applications that they develop spend less on IT security overall and, as a result, are less vulnerable

1. Liu, L., & Yu, E. (2003). Designing information systems in social context: A goal and scenario modelling approach. Information Systems, 29(2), 187–203.
2. Liu, L., & Yu, E. (2004). Intentional modelling to support identity management. In P. Atzeni et al. (Eds.), Proceedings of the 23rd International Conference on Conceptual Modelling (ER 2004) (pp. 555–566). LNCS 3288. Berlin, Heidelberg: Springer-Verlag.
3. Liu, L., Yu, E., & Mylopoulos, J. (2002, October 16). Analyzing security requirements as relationships among strategic actors. The 2nd Symposium on Requirements Engineering for Information Security (SREIS’02). Raleigh, NC.
4. Liu, L., Yu, E., & Mylopoulos, J. (2003, September). Security and privacy requirements analysis within a social setting. Proceedings of International Conference on Requirements Engineering (RE’03) (pp. 151–161). Monterey, CA.
5. Lodderstedt, T., Basin, D.A., J, & Doser, R. (2002). SecureUML: A UML-based modelling language for model-driven security. Proceedings of UML ‘02: Proceedings of the 5th International Conference on The Unified Modelling Language, Dresden, Germany (pp. 426–441).

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details