safety and security of web-applications (presentation)
TRANSCRIPT
![Page 1: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/1.jpg)
Safety and Security of Web-
Applications Author:
Dolganov Aleksey
![Page 2: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/2.jpg)
1. Unconfirmed data input
![Page 3: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/3.jpg)
2. Hacked access control
![Page 4: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/4.jpg)
3. Authentication & Session Control
![Page 5: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/5.jpg)
4. Buffer overflow
![Page 6: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/6.jpg)
5. JavaScript- & SQL-injection
![Page 7: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/7.jpg)
6. Unprotected storage folder
![Page 8: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/8.jpg)
7. DoS- & DDoS-attacks
![Page 9: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/9.jpg)
Security and Safety
![Page 10: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/10.jpg)
1. Only necessary privileges
![Page 11: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/11.jpg)
2. Multiple levels of protection
![Page 12: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/12.jpg)
3. DDoS-protection
![Page 13: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/13.jpg)
4. Cryptography
![Page 14: Safety and Security of Web-applications (Presentation)](https://reader034.vdocuments.site/reader034/viewer/2022042821/55d26149bb61ebfc628b460b/html5/thumbnails/14.jpg)