Evaluation Methods of WEB Security Threats Based on Situation Change

Author(s):  
Tian Fu ◽  
Zhen Wang ◽  
LaiQuan Liu ◽  
ZiQian Xiao
2021 ◽  
Vol 2 ◽  
pp. 1-9
Author(s):  
Stanislav Dakov ◽  
Anna Malinova

E-commerce security is part of the Web security problems that arise in all business information systems that operate over the Internet. However, in e-commerce security, the dimensions of web security – secrecy, integrity, and availability-are focused on protecting the consumer’s and e-store site’s assets from unauthorized access, use, alteration, or destruction. The paper presents an overview of the recent security issues in e-commerce applications and the usual points the attacker can target, such as the client (data, session, identity); the client computer; the network connection between the client and the webserver; the web server; third party software vendors. Discussed are effective approaches and tools used to address different e-commerce security threats. Special attention is paid to Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), phishing attacks, SQL injection, Man-in-the-middle, bots, denial-of-service, encryption, firewalls, SSL digital signatures, security certificates, PCI compliance. The research outlines and suggests many security solutions and best practices.


2016 ◽  
Vol 12 (4) ◽  
pp. 243-261 ◽  
Author(s):  
Gerardo Canfora ◽  
Corrado Aaron Visaggio

2018 ◽  
pp. 60-67
Author(s):  
Henrika Pihlajaniemi ◽  
Anna Luusua ◽  
Eveliina Juntunen

This paper presents the evaluation of usersХ experiences in three intelligent lighting pilots in Finland. Two of the case studies are related to the use of intelligent lighting in different kinds of traffic areas, having emphasis on aspects of visibility, traffic and movement safety, and sense of security. The last case study presents a more complex view to the experience of intelligent lighting in smart city contexts. The evaluation methods, tailored to each pilot context, include questionnaires, an urban dashboard, in-situ interviews and observations, evaluation probes, and system data analyses. The applicability of the selected and tested methods is discussed reflecting the process and achieved results.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Sign in / Sign up

Export Citation Format

Share Document