A Survey of Emerging Threats in Web Security

Authors

  • Neeraj

Abstract

Web communication has developed into a severe enterprise instrument nowadays. Web gadgets “are the main platform for the customers to switch and change numerous information for communication. These units are variably used for purposes beknown banking, private digital assistance, distant working, m-commerce, web access, leisure and medical usage. Even so, persons are nonetheless hesitant to make use of web units as a result of its safety issue. It is critical to offer a dependable and simple to make use of methodology for securing these web units towards unauthorized entry and numerous attacks. It is most popular to use biometrics for the safety of web units and enhance reliability over Wi-Fi services. This study offers with numerous threats and vulnerabilities that have an effect on the web units and likewise it discusses how biometrics is usually answer to the web gadgets guaranteeing security”. Online threats, usually referred to as web-based threats, are a subset of cybersecurity risks that might cause an unintended internet-based occurrence or action. A malicious act that seeks to corrupt or steal data, disrupt a company's systems, or compromise the entire organization is considered a security threat. A safety event is a scenario where a company's network or facts might also additionally had been exposed. And a security incident is a condition that leads to a fact or community breach.

References

United Nations Statistics Division. Guidelines on the use of electronic data collection technologies in population and housing censuses. [Online]. Available from https://unstats.un.org/unsd/ demographic/standmeth/handbooks/guideline-edct-census-v1.pdf

Sönmez FÖ, Kiliç BG. Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results. IEEE Access. 2021; 9: 25858–25884. doi: 10.1109/ACCESS.2021.3057044.

Sardar R, Anees T. Web of Things: Security Challenges and Mechanisms. IEEE Access. 2021; 9: 31695–31711. doi: 10.1109/ACCESS.2021.3057655.

Park S-H, et al. Performance Evaluation of Open-Source Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection. IEEE Access. 2022; 10: 20259–20269. doi: 10.1109/ACCESS.2022.3152574.

Saleem J, Islam R, Kabir MA. The Anonymity of the Dark Web: A Survey. IEEE Access. 2022; 10: 33628–33660. doi: 10.1109/ACCESS.2022.3161547.

Wang X, Reiter MK. Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. IEEE Trans Dependable Secure Comput. 2010 Apr–Jun; 7(2): 203–216. doi: 10.1109/TDSC.2008.56.

Li C-Y, Wang H-Y, Wang W-C, Huang C-Y. Privacy Leakage and Protection of Input Connection Interface in Android. IEEE Trans Netw Service Manag. 2021 Sep; 18(3): 3309–3323. doi: 10.1109/TNSM.2021.3077010.

Nazah S, Huda S, Abawajy J, Hassan MM. Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach. IEEE Access. 2020; 8: 171796–171819. doi: 10.1109/ACCESS. 2020.3024198.

Jo H, Kim J, Porras P, Yegneswaran V, Shin S. GapFinder: Finding Inconsistency of Security Information From Unstructured Text. IEEE Trans Inf Forensics Secur. 2021; 16: 86–99. doi: 10.1109/TIFS.2020.3003570.

Sujithra M, Padmavathi G. Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. Int J Comput Appl. 2012; 56(14): 24–29.

Lu X, Zhou X, Wang W, Lio P, Hui P. Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering. IEEE Access. 2020; 8: 93648–93662. doi: 10.1109/ACCESS.2020.2994516.

Jo H, Kim J, Porras P, Yegneswaran V, Shin S. GapFinder: Finding Inconsistency of Security Information From Unstructured Text. IEEE Trans Inf Forensics Secur. 2021; 16(1): 86–99. doi: 10.1109/TIFS.2020.3003570.

Science Direct. Privacy Threat. [Online]. Available from https://www.sciencedirect.com/topics/ computer-science/privacy-threat

Olanrewaju RF, Khan BUI, Morshidi MA, Anwar F, Kiah MLBM. A Frictionless and Secure User Authentication in Web-Based Premium Applications. IEEE Access. 2021; 9: 129240–129255. doi: 10.1109/ACCESS.2021.3110310.

Belloro S, Mylonas A. I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild. IEEE Access. 2018; 6: 52779–52792. doi: 10.1109/ACCESS.2018.2869251.

Published

09/17/2022

How to Cite

Neeraj. (2022). A Survey of Emerging Threats in Web Security. JOURNAL OF WEB ENGINEERING &Amp; TECHNOLOGY, 9(2), 27–31. Retrieved from https://stmcomputers.stmjournals.com/index.php/JoWET/article/view/345