Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/8048
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Contractor, Rajvi | - |
dc.date.accessioned | 2018-12-20T07:51:09Z | - |
dc.date.available | 2018-12-20T07:51:09Z | - |
dc.date.issued | 2018-05-01 | - |
dc.identifier.uri | http://10.1.7.192:80/jspui/handle/123456789/8048 | - |
dc.description.abstract | Application security has turned into an essential piece of Information security, it is never again discretionary. Now a days organizations have welcome building up their own application, so as the information related with the application expands, security has turned into the significant worry for application security. The Application Security helps you secure applications throughout the development and maintenance of the code. Securing Applications helps you to secure the code from vulnerabilities. Now a days, attacker perform Heart-bleed, SQL injection, Cross site scripting, Cross Site Request Forgery, and many other attacks on the application, which causes a loss of sensitive data of that application. For protecting this kind of sensitive information source code review should be done. Source code review is a process to identify and remove security risks of the applications which contains sensitive information related to company. When developer develops an application, who don’t have knowledge of how to code securely then this will create a big security hole for the application and attacker can take advantage of this security weakness. Some of the attacks are considers false negatives which your system cannot Identify. These are the most dangerous attacks nowadays. This can result in to big damage to the company and its reputation. So the idea is to develop the system which will help the AppSec team to for reducing their daily manual work and protect the application from the attackers. So I am developing the web Portal for the Application security team which will reduce the manual work for the Bug Bounty program, where external researcher can report the vulnerabilities which they have found during their research work. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Technology | en_US |
dc.subject | Computer 2016 | en_US |
dc.subject | Project Report 2016 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 16MCEI | en_US |
dc.subject | 16MCEI24 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2016 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Information Security Criticality Testing and Remediation | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
16MCEI24.pdf | 16MCEI24 | 1.66 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.