Security Issues in Web Services

Security Issues in Web Services

Priyanka Dixit
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4.ch004
Cite Chapter Cite Chapter

MLA

Dixit, Priyanka. "Security Issues in Web Services." Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., IGI Global, 2018, pp. 57-64. https://doi.org/10.4018/978-1-5225-4100-4.ch004

APA

Dixit, P. (2018). Security Issues in Web Services. In G. Shrivastava, P. Kumar, B. Gupta, S. Bala, & N. Dey (Eds.), Handbook of Research on Network Forensics and Analysis Techniques (pp. 57-64). IGI Global. https://doi.org/10.4018/978-1-5225-4100-4.ch004

Chicago

Dixit, Priyanka. "Security Issues in Web Services." In Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., 57-64. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4.ch004

Export Reference

Mendeley
Favorite

Abstract

This chapter describes how security is an important aspect in today's digital world. Every day technology grows with new advancements in various areas, especially in the development of web-based applications. All most all of the web applications are on the internet, hence there is a large probability of attacks on those applications and threads. This makes security necessary while developing any web application. Lots of techniques have been developed for mitigating and defending against threats to the web based applications over the internet. This chapter overviews the important region of web application security, by sequencing the current strategies into a major picture to further the future research and advancement. Firstly, this chapter explains the major problem and obstacles that makes efforts unsuccessful for developing secure web applications. Next, this chapter distinguishes three basic security properties that a web application should possess: validation, integrity, accuracy and portray the comparing vulnerabilities that damage these properties alongside the assault vectors that contain these vulnerabilities.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.