Research Paper APA format title page thesis statement body conclusion reference page

1 answer below »
Research Paper APA format
title page

thesis statement

body

conclusion

reference page


Answered Same DayDec 21, 2021

Answer To: Research Paper APA format title page thesis statement body conclusion reference page

David answered on Dec 21 2021
111 Votes
Running Head: The Future of Web Security in Web Design 1
The Future of Web Security in Web Design
Your Name
School Name
Running Head: The Future of Web Security in Web Design 2

Introduction
Web security is the topmost concern while designing the website. The designs of website are
secure and free from attacks if they are concerned about security in mind from start up. The
website designing increases the risk of threats. S
o it is very difficult to estimate that attacks or
threats. This document very well explains the concept of threats and vulnerabilities related to
security under website design.
Factors to estimate the website attacks or threats
It depends upon following factors:
Authentication: This is the process to test the users credential, whether the user is actually have
their valid user login details, such as user id or password to access the website or not. If it
validates than the user is entitled to enter the website otherwise he will not be allowed to enter
the website. This usually keeps unwanted or harmful users away from the system.
Authorization: There are several areas in the website such as health website in which some
users have access or some may not have access to the same area of system. This is usually done
so that different type of users can perform different types of action using the features present in
the online system. Such as a manager of the health system as some different level of access, a
doctor has different level of access; a patient has different level of access.
Data security: The data which is stored at the backend must be secure and does not give access
to all as the data is very private and not available for everyone’s use. So, as to prevent the
database file misuse, we must put the user name and password control on the file, so that the
specific and users which are required can only use this file.
Running Head: The Future of Web Security in Web Design 3

Validation: The user forms must be validated for every control so that the user can enter only
the correct values and no incorrect values will be accepted by the system. By doing this we can
prevent the database to have lower or reduced redundancy and we can as well prevent wrong
data to be entered into the system.
Evaluation: This must be done before the data is stored at backend so that everything is
appropriate on the user end.
Methods that are used to estimate the website attacks or threats:
1. The web based user interface system is planned according to the requirement of the end users.
2. Most or all of the features are covered in it and according to them, and they are ready to use it.
3. They find many of the features in the system as great which helps them a lot to save their time
and money.
4. There are several other objectives which are as well covered already in the application which
gives this an upper hand and all recommended this application as a winner.
5. The date should be validated; this is done so that the user can not enter the wrong date, e.g
while booking any appointment user can not book a appointment in the past. He must book an
appointment in the future date only. There are several other validation checks must be present.
6. Records which are entered into the database must be encrypted in some particular format so
that the data entered is not easily understood and must be difficult for hacker understanding.
7. There must be a email functionality in the web application so that periodic reminders or
anything if required to communicate with the doctors can be done. [security.arizona.edu]
Running Head: The Future of Web Security in Web Design 4
Different types of website threats
Adware: It is any software application in which advertising banners are displayed while the
program is running. Some types of adware are also spyware. There likelihood score is high.
Spyware: Spyware is a type of malware that is attached themselves on computers and collects
information about users without their knowledge. Sometimes, spywares such as key loggers are
installed in order to secretly monitor other users. The presence of spyware is not visible to the
user. It is very difficult to detect. The various types of personal information collect by spyware
program is internet surfing details about user ,which sites users have been visited but can also
interfere with user control of the computer in other ways such as installing additional software
and redirecting Web browser activity. It also changes the settings of computer and lead to slow
connection speeds.
Trojan: Trojan is also a malware that can modify the user’s computer or show advertisements in
undesirable places such as the desktop or open popup windows. It is installed into user computer
through the Software downloads, Email...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here