مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

242
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

319
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Broken Authentication and Session Management Vulnerabilities

Pages

  11-19

Abstract

 Web application protection is today's most important battleground between the victim, intruder, and web service resource. User authentication tends to be critical when a legitimate user of the web application abruptly ends the contact while the session is still active, and an unauthorized user chooses the same session to gain access to the device. For many corporations, risk detection is still a problem. In other cases, it is a usual way of operating that provides the requisite protection to keep the product free of weaknesses. Using various types of software to identify di erent security vulnerabilities assists both developers and organizations in securely launching applications, saving time and money. Di erent combinations of tools have been seen to enhance protection in recent years, but it has not been possible to combine the types of tools available on the market until the writing of this report. This paper aims to clarify vulnerabilities in Broken Authentication and Session Management. It is worth noting that if the creator practices the preventive techniques outlined in this article, the chances of exploitation being discussed are reduced. This paper revealed that the most powerful ways to exploit the Broken Authentication and Session Management vulnerabilities of the web application in those domains are Session Miscon guration assault and Cracking/ Guessing Weak Passwords. Correspondingly included techniques to defend authentication and the most important is using a robust encryption system, setting password rules, and securing the session ID.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Aljoaey, Hanan, Almutawa, Khawla, Alabdali, Ruyuf, & Ibrahim, Dina M.. (2021). Broken Authentication and Session Management Vulnerabilities. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 13(3), 11-19. SID. https://sid.ir/paper/983674/en

    Vancouver: Copy

    Aljoaey Hanan, Almutawa Khawla, Alabdali Ruyuf, Ibrahim Dina M.. Broken Authentication and Session Management Vulnerabilities. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2021;13(3):11-19. Available from: https://sid.ir/paper/983674/en

    IEEE: Copy

    Hanan Aljoaey, Khawla Almutawa, Ruyuf Alabdali, and Dina M. Ibrahim, “Broken Authentication and Session Management Vulnerabilities,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 13, no. 3, pp. 11–19, 2021, [Online]. Available: https://sid.ir/paper/983674/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button