Importance Of Web Security Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Web security is linked with internet its aim is to establish rules and measures and applies to internet to control the data attacks. The main application of this security is by protectecting the web application assets and the user need to be control and maintain the customer data and opposing the company name. In the web security we have to secure the data when data is exchanging in the internet it can hacked by any other group to control that we have to follow some general integrity techniques to encryption of data and send over the internet channel by controlling against form the internet hackers different security methods to follow i.e. network layer security and IPSec protocol. They are different malicious software are running around the internet they are Malware, viruses, Trojan horse, spyware, Worms, Botnet etc.

1. Introduction:

This environment is not secure while exchanging the data over the internet because of in this environment every computer connected to the network that ease of data sharing is possible. by this way we can use online shopping, Communication with others through personal e-mails through always with network linked computers. This is an opportunity to the hackers and for scam people to hack the data from their mails and change the information over the internet. so it's highly impossible to given a security for every computer that is connected to the internet.

Growth in using of web users number of web security software's are coming out form the companies from past 5 years even though number of web security software are coming most of the companies don't know how to use it, they might be loss of data to minimize the threat they have to follow the security measures and the procedures and apply to it.web security policies is to protect the hardware and software attacks from the hackers and viruses.

A. Vulnerabilities:

Vulnerability is a failure in the system it's an advantage to the hacker to hack the data easily, it's a combination of three main elements security flaws in the system, attacker capability to tap the flaw and hacker access the flaw, to be vulnerable the system hacker has the at least apply one applicable tool to get the system for an vulnerable this one also free attack surface to hacker.

The vulnerabilities occur in the web securities are security procedures, administrative controls these are the threats it to be advantage to the hackers that gain unauthorized services easily hack the data and modified the data in websites. We have to avoid this by controlling the vulnerabilities in the system and to maintain security techniques to control the malicious attacks to the system.

B.IP Sec

IP sec provide security services at the network layer by securing internet protocol while the communication processing happening end to end user the data is authenticated and encryption of individual IP packet and send to the user for use this service they need to use some secure protocols and some algorithm techniques. While the data flow is in between the hosts to protect the data flow IPSec is used in between them, also used between the two security gate ways or in between host and security gateway.

All security services are provided are the IP layer because it provided by connectionless integrity, authentication of data origin it can be used by any upper layer protocols like TCP,BGP,ICMP etc..

Generally IPSec provides to standard security protocols i.e. Authentication header and Encapsulation Security Protocols by the use of cryptographic key management technique.

The IPSec can also be implemented while data is moving from host to host via transport mode or tunnel mode. In the transport mode only the data packets only authenticated or encrypted, but in the tunnel mode the full IP packet be authenticated or encrypted for IP header its encapsulate with a new IP packet

IPsec architecture and protocol stack

Fig: Protocol Structure - IPSec: Security Architecture for IP Network

IP Encapsulating Security Payload

ESP acts as a centre portion for the internet protocol security architecture this architecture is designed with the combination of IPV4 and IPV6. ESP provides secretly all the data is encrypted which the data is sent at transport layer segment. It might be provide to a entire IP datagram it also provides a authentication for data payload without authentication there is a no use of providing encryption the data may be insecure but IP packet header is not protected by ESP.

FIG: Encapsulating security payload

IPSec Authentication Header

The authentication header is a part of IPSec protocol that provides an authentication for the data packets at the transport layer and provides protection for upper level protocols data as well it provides a authentication for IP header fields. Authentication header is used for itself and with encryption service payload but ESP provides only for itself.

Fig: Authentication Header format

Measuring Web traffic

In the internet there are number of webpages are rounding all over the internet any web pages can be accessed any where by the user accesses , In this a large portion of the data is moving in the internet traffic in the webtraffic is detemined by number of times a user visits the web sites and number of pages he visited the site its allover the incoming and outgoing of the traffic of the particular site .some sites is limited to the particular country itself .there are many ways to check the data with the help of some structured sites by implementing security problems or a bandwidth limited

While measuring the webtraffic to check the most popular websites in that there are individual pages will be found in the site .This traffic is measured by checking the statistics found in the webserver .the user accessing the sites number of times the pages coming coming from the webserver a log file will be created it's an automatically generated in the server by the different pages in the site this log file will created according to the hits of the file is generated in this image is also considered as a file .In a particular site main page and sub pages are the the page view is generated the user sends an request to access the page in a particular website while opening the site the user atleast check the one main page, it may possible to access more

Fig:log file of webtraffic

Some comparisions of monitoring the web traffic:

Its depend on visitors accessing the website.

In the particular web sites number of pages are there the information is shared in the different webpages the user monitoring the webpages per each visit.

The time duaration, how much time averagely while monitoring the same page or an website.

Accessing the same page with different times.

In the websites the main page itself attract the visitor to access the site so it accessed monitored a entry page

Path lcoation is used to identify the wepage from main page to exit page by this we can find out the path location of most visited webistes.


According to the survey almost 90% of the companies in the world using the internet .Almost all companies are depend on the internet by growing up their business and also it will be increase 32% more over the next five years

Because of the growing of sites which lead to the vulnerabilities.This the problem was facing by so many comapanies of the security problems .As the companies are enforcing developing a securty plan to accomplish the existing solutions and the survey all the companies are endured and developing a security solution by growing theier business and racy attack the security.The it companies put afford to provide a scalable security to protect the business and the assets of the company.