Countering Cross-Site Scripting in Web-Based Applications

Countering Cross-Site Scripting in Web-Based Applications

Loye Lynn Ray
ISBN13: 9781522534228|ISBN10: 1522534229|EISBN13: 9781522534235
DOI: 10.4018/978-1-5225-3422-8.ch014
Cite Chapter Cite Chapter

MLA

Ray, Loye Lynn. "Countering Cross-Site Scripting in Web-Based Applications." Application Development and Design: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 370-383. https://doi.org/10.4018/978-1-5225-3422-8.ch014

APA

Ray, L. L. (2018). Countering Cross-Site Scripting in Web-Based Applications. In I. Management Association (Ed.), Application Development and Design: Concepts, Methodologies, Tools, and Applications (pp. 370-383). IGI Global. https://doi.org/10.4018/978-1-5225-3422-8.ch014

Chicago

Ray, Loye Lynn. "Countering Cross-Site Scripting in Web-Based Applications." In Application Development and Design: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 370-383. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3422-8.ch014

Export Reference

Mendeley
Favorite

Abstract

Today's dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security project (OWASP) top ten web-threats. XSS occurs when a Web-based application allows untrusted information be accepted and sent back to a browser. Also they can execute scripts within a browser that can deface web sites, redirect users to malicious content and hijack browsers. One reason for this problem was the lack of developers understanding the causes of XSS. In this paper, the authors address the causes of XSS and countermeasures to defense against these threats.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.