> 
 > 
Subscription Review Article

Web Security: Crafting Fortified Online Platforms

by 
   Riya Premarajan Vechiot,    Yogita Vijay Biradar,
Volume :  11 | Issue :  01 | Received :  February 29, 2024 | Accepted :  March 30, 2024 | Published :  April 3, 2024
DOI :  10.37591

[This article belongs to Journal of Web Engineering & Technology(jowet)]

Keywords

web-security; web applications; best practices; Vulnerability Prevention, Security-First Development

Abstract

With incidents of cyber-attacks on websites and breaches of sensitive data on the rise, adopting secure coding or development practices to build strong web applications is long overdue. These practices encompass a variety of strategies, including but not limited to, input validation to prevent SQL injection and XSS attacks, secure session management, encryption of sensitive data, and the implementation of robust authentication and authorization mechanisms. This approach not only fortifies applications against known web vulnerabilities but also ingrains a culture of security within the development process. Drawing from a wealth of knowledge shared by industry professionals, this research paper underscores the importance of incorporating these secure development practices from the outset. Furthermore, adopting a security-first mindset encourages the ongoing evaluation and updating of security measures to combat evolving cyber threats. This research paper compiles insights from various sources by industry experts. Applying these practices at the development stage would result in applications that are not susceptible to known web application vulnerabilities.

Full Text

References

[1] Alabdulrazzaq, Haneen. Securing Web Applications: Web Application Flow Whitelisting to Improve Security. 2017.
[2] Baars, Nanne. “Web Application Security: 10 Things Developers Need to Know.” www.youtube.com, 22 May 2018, youtu.be/qjrkV4RjgIU?si=ZIPfOCqWmNOqIj pr. Accessed 7 Oct. 2023.
[3] BEER, ELIOT. “Infosys Leak: IT Firm Left AWS Key Exposed on PyPi since Feb 2021.” The Stack, 18 Nov. 2022,
[4] www.thestack.technology/infosys-leak-aws- key-exposed-on-pypi/. Accessed 28 Oct. 2023.
[5] “First 5 Tips for Building Secure (Web) Apps.” Telerik Blogs, 6 Nov. 2019, www.telerik. com/blogs/first-5-tips-for-building-secure-web-apps. Accessed 30 Oct. 2023.
[6] “Secrets Management – OWASP Cheat Sheet Series.” Cheatsheetseries.owasp.org, cheatsheet series.owasp.org/cheatsheets/Secrets_Manage ment_Cheat_Sheet.html. Accessed 22 Oct. 2023.
[7] “What Is a Web Application Firewall (WAF)?” www.f5.com/glossary/web-application- firewall-waf. Accessed 27 Oct. 2023.
[8] haider A. Top 21 .NET Security Best Practices For Web Applications – Clickysoft. Clickysoft. 2023. Available from: https://clickysoft.com/dot-net-security-best-practices/ ‌
[9] zac1987. Can I fully prevent SQL injection by PDO Prepared statement without bind_param? . Stack Overflow. 2024. Available from: https://stackoverflow.com/questions/7915952/can-i-fully-prevent-sql-injection-by-pdo-prepared-statement-without-bind-param ‌
[10] gayatri r. Stored Cross-Site Scripting(Non-Privileged User to Anyone) . Medium. Medium; 2020 . Available from: https://gaya3-r.medium.com/stored-cross-site-scripting-non-privileged-user-to-anyone-1754e0a053d6 ‌