Web vulnerability analysis and implementation

19Citations
Citations of this article
87Readers
Mendeley users who have this article in their library.

Abstract

Data security on the internet is synonymous with a website and a computer network that connects to one another. In the context of computer networks, any existing data on a computer that is connected to another computer, is unsafe, so need to do some way to secure the data so that cannot be accessed by another computer. Each website is created using a series of codes to be able to display data that is public and accessible or accessible to everyone. However, usually on the server computer where the website is stored, there are also data that are confidential or private, so it is not allowed to be accessed by the public. This research is conducted to analyze various techniques and ways of attack that usually done on the internet website, in order to implement various ways of handling so that the existing website can be more secure against the attack so that the data contained in the server. The results have been obtained that is known some weaknesses and attacks that occur on a website. This research used htaccess technique and website script for security improvement. But, the improvements that have been done still cannot guarantee the website 100% safe, it is because that in the world of data security in addition to the web and server side is fixed, must also be viewed from the network security.

References Powered by Scopus

Data security and privacy protection issues in cloud computing

601Citations
N/AReaders
Get full text

Cloud computing security threats and responses

198Citations
N/AReaders
Get full text

SQL Injection Attacks and Defense

90Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Comparison of document similarity measurements in scientific writing using Jaro-Winkler Distance method and Paragraph Vector method

15Citations
N/AReaders
Get full text

Cybercrime Issues in Smart Cities Networks and Prevention Using Ethical Hacking

6Citations
N/AReaders
Get full text

Security Vulnerability Analysis of the Sharia Crowdfunding Website Using OWASP-ZAP

5Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Setiawan, E. B., & Setiyadi, A. (2018). Web vulnerability analysis and implementation. In IOP Conference Series: Materials Science and Engineering (Vol. 407). Institute of Physics Publishing. https://doi.org/10.1088/1757-899X/407/1/012081

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

59%

Lecturer / Post doc 4

24%

Professor / Associate Prof. 2

12%

Researcher 1

6%

Readers' Discipline

Tooltip

Computer Science 17

61%

Engineering 9

32%

Psychology 1

4%

Earth and Planetary Sciences 1

4%

Save time finding and organizing research with Mendeley

Sign up for free