Classification of Web-Service-Based Attacks and Mitigation Techniques

Classification of Web-Service-Based Attacks and Mitigation Techniques

Hossain Shahriar, Victor Clincy, William Bond
Copyright: © 2018 |Pages: 19
ISBN13: 9781522555834|ISBN10: 1522555838|EISBN13: 9781522555841
DOI: 10.4018/978-1-5225-5583-4.ch015
Cite Chapter Cite Chapter

MLA

Shahriar, Hossain, et al. "Classification of Web-Service-Based Attacks and Mitigation Techniques." Security and Privacy Management, Techniques, and Protocols, edited by Yassine Maleh, IGI Global, 2018, pp. 360-378. https://doi.org/10.4018/978-1-5225-5583-4.ch015

APA

Shahriar, H., Clincy, V., & Bond, W. (2018). Classification of Web-Service-Based Attacks and Mitigation Techniques. In Y. Maleh (Ed.), Security and Privacy Management, Techniques, and Protocols (pp. 360-378). IGI Global. https://doi.org/10.4018/978-1-5225-5583-4.ch015

Chicago

Shahriar, Hossain, Victor Clincy, and William Bond. "Classification of Web-Service-Based Attacks and Mitigation Techniques." In Security and Privacy Management, Techniques, and Protocols, edited by Yassine Maleh, 360-378. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5583-4.ch015

Export Reference

Mendeley
Favorite

Abstract

Web services are being widely used for business integration. Understanding what these web services are and how they work is important. Attacks on these web services are a major concern and can expose an organizations' valuable resources. This chapter performs a survey describing web service attacks. The authors provide a taxonomy of web service vulnerabilities and explain how they can be exploited. This chapter discusses some of the approaches that make up best practices and some that are in the development phase. They also discuss some common approaches to address the vulnerabilities. This chapter discusses some of the approaches to be using in planning and securing web services. Securing web services is a very important part of a cybersecurity plan.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.