Vulnerabilities In Web Security And The Internet Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Web security is linked with internet its aim is to establish rules and measures and applies to internet to control the data attacks. The main application of this security is by protectecting the web application assets and the user need to be control and maintain the customer data and opposing the company name. In the web security we have to secure the data when data is exchanging in the internet it can hacked by any other group to control that we have to follow some general integrity techniques to encryption of data and send over the internet channel by controlling against form the internet hackers different security methods to follow i.e. network layer security and IPSec protocol. They are different malicious software are running around the internet they are Malware, viruses, Trojan horse, spyware, Worms, Botnet etc.

1. Introduction:

This environment is not secure while exchanging the data over the internet because of in this environment every computer connected to the network that ease of data sharing is possible. by this way we can use online shopping, Communication with others through personal e-mails through always with network linked computers. This is an opportunity to the hackers and for scam people to hack the data from their mails and change the information over the internet. so it's highly impossible to given a security for every computer that is connected to the internet.

Growth in using of web users number of web security software's are coming out form the companies from past 5 years even though number of web security software are coming most of the companies don't know how to use it, they might be loss of data to minimize the threat they have to follow the security measures and the procedures and apply to it.web security policies is to protect the hardware and software attacks from the hackers and viruses.

A. Vulnerabilities:

Vulnerability is a failure in the system it's an advantage to the hacker to hack the data easily, it's a combination of three main elements security flaws in the system, attacker capability to tap the flaw and hacker access the flaw, to be vulnerable the system hacker has the at least apply one applicable tool to get the system for an vulnerable this one also free attack surface to hacker.

The vulnerabilities occur in the web securities are security procedures, administrative controls these are the threats it to be advantage to the hackers that gain unauthorized services easily hack the data and modified the data in websites. We have to avoid this by controlling the vulnerabilities in the system and to maintain security techniques to control the malicious attacks to the system.

B.IP Sec

IP sec provide security services at the network layer by securing internet protocol while the communication processing happening end to end user the data is authenticated and encryption of individual IP packet and send to the user for use this service they need to use some secure protocols and some algorithm techniques. While the data flow is in between the hosts to protect the data flow IPSec is used in between them, also used between the two security gate ways or in between host and security gateway.

All security services are provided are the IP layer because it provided by connectionless integrity, authentication of data origin it can be used by any upper layer protocols like TCP,BGP,ICMP etc..

Generally IPSec provides to standard security protocols i.e. Authentication header and Encapsulation Security Protocols by the use of cryptographic key management technique.

The IPSec can also be implemented while data is moving from host to host via transport mode or tunnel mode. In the transport mode only the data packets only authenticated or encrypted, but in the tunnel mode the full IP packet be authenticated or encrypted for IP header its encapsulate with a new IP packet

IPsec architecture and protocol stack

Fig: Protocol Structure - IPSec: Security Architecture for IP Network

IP Encapsulating Security Payload

ESP acts as a centre portion for the internet protocol security architecture this architecture is designed with the combination of IPV4 and IPV6. ESP provides secretly all the data is encrypted which the data is sent at transport layer segment. It might be provide to a entire IP datagram it also provides a authentication for data payload without authentication there is a no use of providing encryption the data may be insecure but IP packet header is not protected by ESP.

http://www.chainringcircus.org/images/ESP.png

FIG: Encapsulating security payload

IPSec Authentication Header

The authentication header is a part of IPSec protocol that provides an authentication for the data packets at the transport layer and provides protection for upper level protocols data as well it provides a authentication for IP header fields. Authentication header is used for itself and with encryption service payload but ESP provides only for itself.

http://www.chainringcircus.org/images/AH.png

Fig: Authentication Header format

Measuring Web traffic

In the internet there are number of webpages are rounding all over the internet any web pages can be accessed any where by the user accesses , In this a large portion of the data is moving in the internet traffic in the webtraffic is detemined by number of times a user visits the web sites and number of pages he visited the site its allover the incoming and outgoing of the traffic of the particular site .some sites is limited to the particular country itself .there are many ways to check the data with the help of some structured sites by implementing security problems or a bandwidth limited

While measuring the webtraffic to check the most popular websites in that there are individual pages will be found in the site .This traffic is measured by checking the statistics found in the webserver .the user accessing the sites number of times the pages coming coming from the webserver a log file will be created it's an automatically generated in the server by the different pages in the site this log file will created according to the hits of the file is generated in this image is also considered as a file .In a particular site main page and sub pages are the the page view is generated the user sends an request to access the page in a particular website while opening the site the user atleast check the one main page, it may possible to access more

Fig:log file of webtraffic

Some comparisions of monitoring the web traffic:

Its depend on visitors accessing the website.

In the particular web sites number of pages are there the information is shared in the different webpages the user monitoring the webpages per each visit.

The time duaration, how much time averagely while monitoring the same page or an website.

Accessing the same page with different times.

In the websites the main page itself attract the visitor to access the site so it accessed monitored a entry page

Path lcoation is used to identify the wepage from main page to exit page by this we can find out the path location of most visited webistes.

Conclusion:

According to the survey almost 90% of the companies in the world using the internet .Almost all companies are depend on the internet by growing up their business and also it will be increase 32% more over the next five years

Because of the growing of sites which lead to the vulnerabilities.This the problem was facing by so many comapanies of the security problems .As the companies are enforcing developing a securty plan to accomplish the existing solutions and financial.by the survey all the companies are endured and developing a security solution by growing theier business and racy attack the security.The it companies put afford to provide a scalable security to protect the business and the assets of the company.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.