Web Security: Crafting Fortified Online Platforms

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 3, 2024 at 4:55 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Riya Premarajan Vechiot, Yogita Vijay Biradar

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Research Scholar, Research Scholar, MCA, Thakur Institute of Management Studies, Career Development & Research (TIMSCDR), Mumbai, MCA, Thakur Institute of Management Studies, Career Development & Research (TIMSCDR), Mumbai, Maharashtra, Maharashtra, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nWith incidents of cyber-attacks on websites and breaches of sensitive data on the rise, adopting secure coding or development practices to build strong web applications is long overdue. These practices encompass a variety of strategies, including but not limited to, input validation to prevent SQL injection and XSS attacks, secure session management, encryption of sensitive data, and the implementation of robust authentication and authorization mechanisms. This approach not only fortifies applications against known web vulnerabilities but also ingrains a culture of security within the development process. Drawing from a wealth of knowledge shared by industry professionals, this research paper underscores the importance of incorporating these secure development practices from the outset. Furthermore, adopting a security-first mindset encourages the ongoing evaluation and updating of security measures to combat evolving cyber threats. This research paper compiles insights from various sources by industry experts. Applying these practices at the development stage would result in applications that are not susceptible to known web application vulnerabilities.

n

n

n

Keywords: web-security; web applications; best practices; Vulnerability Prevention, Security-First Development

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Web Engineering & Technology(jowet)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Web Engineering & Technology(jowet)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Riya Premarajan Vechiot, Yogita Vijay Biradar Web Security: Crafting Fortified Online Platforms jowet April 3, 2024; 11:-

n

How to cite this URL: Riya Premarajan Vechiot, Yogita Vijay Biradar Web Security: Crafting Fortified Online Platforms jowet April 3, 2024 {cited April 3, 2024};11:-. Available from: https://journals.stmjournals.com/jowet/article=April 3, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘jowet’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

[1] Alabdulrazzaq, Haneen. Securing Web Applications: Web Application Flow Whitelisting to Improve Security. 2017.
[2] Baars, Nanne. “Web Application Security: 10 Things Developers Need to Know.” www.youtube.com, 22 May 2018, youtu.be/qjrkV4RjgIU?si=ZIPfOCqWmNOqIj pr. Accessed 7 Oct. 2023.
[3] BEER, ELIOT. “Infosys Leak: IT Firm Left AWS Key Exposed on PyPi since Feb 2021.” The Stack, 18 Nov. 2022,
[4] www.thestack.technology/infosys-leak-aws- key-exposed-on-pypi/. Accessed 28 Oct. 2023.
[5] “First 5 Tips for Building Secure (Web) Apps.” Telerik Blogs, 6 Nov. 2019, www.telerik. com/blogs/first-5-tips-for-building-secure-web-apps. Accessed 30 Oct. 2023.
[6] “Secrets Management – OWASP Cheat Sheet Series.” Cheatsheetseries.owasp.org, cheatsheet series.owasp.org/cheatsheets/Secrets_Manage ment_Cheat_Sheet.html. Accessed 22 Oct. 2023.
[7] “What Is a Web Application Firewall (WAF)?” www.f5.com/glossary/web-application- firewall-waf. Accessed 27 Oct. 2023.
[8] haider A. Top 21 .NET Security Best Practices For Web Applications – Clickysoft. Clickysoft. 2023. Available from: https://clickysoft.com/dot-net-security-best-practices/ ‌
[9] zac1987. Can I fully prevent SQL injection by PDO Prepared statement without bind_param? . Stack Overflow. 2024. Available from: https://stackoverflow.com/questions/7915952/can-i-fully-prevent-sql-injection-by-pdo-prepared-statement-without-bind-param ‌
[10] gayatri r. Stored Cross-Site Scripting(Non-Privileged User to Anyone) . Medium. Medium; 2020 . Available from: https://gaya3-r.medium.com/stored-cross-site-scripting-non-privileged-user-to-anyone-1754e0a053d6 ‌

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal of Web Engineering & Technology

n

[if 344 not_equal=””]ISSN: 2455-1880[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received February 29, 2024
Accepted March 30, 2024
Published April 3, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]