IT project570

1
This is my proposal and topic but I did not add code
Complete the research or change the topic if you want
Web security
Abstract
The following project is an understanding of the various security issues related to
modern day web usage. Websites have been used for very many purposes while they have
also introduced a lot of new possibilities and connections not possible previously. Through
these connections, the application of websites has made a lot of personal data vulnerable to
attacks. Most of the websites which have private logins to access products and services have
become vulnerable to attacks. The following report goes into an understanding of the means
in which traditional transactions have given way to modified means of carrying out them.
This report has a practical solution of code that is a software development standard which
shows how email verification feature can be used to protect user log in by confirming its
credentials. It then goes more in-depth into how security features should be upgraded and
used to protect data, store it and protected it to be used. The report shows why it is very
important for some online websites to use email or phone verification to confirm credentials.
Finally, it presents the threats that are being faced owing to this same thing and the way there
is a continuous evolution of risks and means to combat it.
2
Contents
Abstract ...................................................................................................................................... 1
Introduction ................................................................................................................................ 3
Planning ..................................................................................................................................... 4
Cybercrime ……………………………………………………………………………………………………………………………………....5
Expected outcome…………………………………………………………………………...8
reference…………………………………………………………………………………………………………………………………………..9
3
Introduction
The way we look at communication had been changed by the advent of the internet in
the 1990s. However, the game of connectivity was taken one step further by the introduction
of website platforms like social networks and other interactive features that ensured
connectivity on the go at all times. As a result, the World Wide Web (a system of extensively
interlinked hypertext documents: a branch of the Internet (usually preceded by the) became the
point of access for people across the globe. However, it became the center for all knowledge
gained through study, communication, research, instruction e.g. factual data. Personal and
official that a person may get access to. The ease of use and the easy availability were factors
that led to a so many people using and publishing their businesses online (by means of using a
computer). While anyone could get access to the internet, some people have taken advantage
by using this opportunity to interfere with other networks online by either tapping their
information or hacking (replacement of a single course of stonework by two or more lower
courses) passcodes(a combination of numbers or movements on the screen that allow you to
use an electronic device) and interfering with online business such as the e-commerce stores(a
business that is transacted by transferring data electronically, especially over the internet).
Hosting of website applications (a program or group of programs designed for end users. is a
program or group of programs designed for end users.) has widely grown while the number of
people who are focused on through passing log in security credentials. Implementing the log
in strategy to prevent cybercrime (this is a crime in which a computer is the object of the crime
or is used as a tool to commit an offense.) is one of the most important things that should be
considered when giving the public access to an online site. It has been discovered that most of
the companies are using web services (this are services offered by an electronic device to
another device, communicating with each other via the world web) to better their delivery
services to their customer. Email (a system for sending messages from one individual to another
4
via electronic telecommunications links between computers or terminals using a designed
software) and phone verification comes in handy in every task that deal with credentials,
whether it be sending or receiving money online, getting access to an online business platform,
either an e-commerce site. Cybercrime is a new form of hacking that came to take advantage
of these online businesses like the e-commerce stores. Many people have now started storing
their special data such as bank data, passwords, official information or any other kind of vital
data online or the various clouds (this is any of the several, often proprietary, parts of the
internet that gives access to online processing and storing of information or data. It also gives
access to software online) that are accessible but these types of storage have often been messed
up with. While they were easy to use, they were even easy to look into without being authorized
by unethical hackers (a person using a computer to commit a crime or to get access to data that
he/she has no access to).
Planning
While there has been a rise in cybercrime, there has also been an increase in the
various measures (steps towards safety) taken to make website applications more secure or
freer safer from the unethical hackers. It would be more appealing to say that website
applications these days have advanced or come a long way from what they used to be in the
initial stages of their introduction in the market ( since the first website application to the
latest website application) (Espejo, 2013). Companies, institutions or organizations using
website applications and application developer organizations are always on the lookout
(engaged in the keep watch) for new threats (a declaration of an intention or determination to
inflict actions) that continuously linger about on the internet. While there has been a
5
considerable development of systems that create security for online, there needs to be a
constant development of such processes and systems (Ilyas and Ahson, 2006). This is
because while the security systems are developing, there is a massive network of unethical
hackers waiting to create means to hack the new systems. The organizations are and should
continue to follow the Kaizen methods to keep on improving the systems. While access to a
web application may apparently look safe, it is never so at any given point in time (Espejo,
2013). This is because the website application may have closed all the earlier points of access
but it still contains several loopholes that are being used by hackers to gain access to personal
data.
Cybercrime has so many reasons to which it is committed, these reasons include the
following:-Gathering Trophies (the need to be regarded as the best of the famous among the
commoners), General Mischief (the idea of a person being bad minded just concerned about
harming others), Financial Gain (some of the persons who do cybercrimes have the intention
the benefitting financially through either hacking into bank accounts of the victims).
Revenge (the hackers to do cause harm to the victims as a result of earlier incidences done to
him/her, Forging Documents and Messages (the hackers want to gain access to the main
document so that they can see how it looks and probably make another document that looks
exactly the same as the original one),the protest, Criminal activity for instance kidnapping or
theft
Identity theft; Becoming the victim of cybercrime can have long-lasting effects on your life.
One common technique scammers employ is phishing, sending false emails purporting to
come from a bank or other financial institution requesting personal information. If you hand
over this information, it can allow the criminal to access your bank and credit accounts, as
well as open new accounts and destroy your credit rating. This type of damage can take
6
months or even years to fix, so protecting your personal information online is an important
skill to learn.
Security cost; Cybercriminals also focus their attacks on businesses, both large and small.
Hackers may attempt to take over company servers to steal information or use the machines
for their own purposes, requiring companies to hire staff and update software to keep
intruders out. According to EWeek, a survey of large companies found an average
expenditure of $8.9 million per year on cybersecurity, with 100 percent of firms surveyed
reporting at least one malware incident in the preceding 12 months and 71 percent reporting
the hijacking of company computers by outsiders.
Piracy
The cybercrime of piracy has had major effects on the entertainment, music and software
industries. Claims of damages are hard to estimate and even harder to verify, with estimates
ranging widely from hundreds of millions to hundreds of billions of dollars per year. In
response, copyright holders have lobbied for stricter laws against intellectual property theft,
resulting in laws like the Digital Millennium Copyright Act. These laws allow copyright
holders to target file sharers and sue them for large sums of money to counteract the financial
damage of their activities online.
7
Cybercrimes
Cybercrime cannot be completely eliminated but it can be minimized in the following ways:-
Refrain from opening e-mail and any other email attachments from unknown sources, Refrain
from executing.EXE or unknown files directly from your email, Make sure to use a firewall
to protect data from unauthorized sources, Make it a habit to buy application software or
system software from the real developers whose profile is known, have all your browsers
protected from pop-up Ads (advertisements)and Many of us are used to checking for viruses
and malware on our personal computers, but don’t realize that websites and web applications
are just as susceptible Having a backup, recovering from many types of common cybercrimes
often involves restoring your data from a point prior to the event in question. Not having
reliable and securely stored backups of your data is a significant liability, have an anti-
virus; Leading antivirus software can detect, remove, and protect your machines and network
from malware.house all your software and hardware in your house since Exploits in software
are very common ways hackers gain access to systems and sensitive data. Updating software
on network-connected machines should always be a top priority.
The chief aim of all cybercrime is financial; that is most crimes are committed with the aim
of getting more wealth. In relation to the research conducted by infosec institute in 2013,
cybercrimes that had already been committed, made up of 0.4% - 1.4% of the global Gross
Domestic Produce. This voluminous cybercrime scale impacted negatively on the economy,
and the present in virtually every developed or developing state or country.
8
Expected outcomes
What can be expected from the monitoring of possible threats in the future is the
development of new website applications that are more secure than earlier ones and would be
ready against future threats (Karimi, 2014). These software engineers or organizations
creating website applications and developing platforms need to be in constant search for the
loopholes that might be utilized by the hackers. Such a task needs a considerable amount of
foresight before they can be implemented. A level of preparedness that encompasses the idea
of what might happen and what tools might be used is the key to creating a solution and more
secure solutions for future use.
9
References
Espejo, R. (2013). Smartphones. Detroit: Greenhaven Press.
Ilyas, M. and Ahson, S. (2006). Smartphones. Chicago, Ill.: IEC.
Karimi, H. (2014). Universal navigation on smartphones. [Place of publication not identified]:
Springer.
Mobile media making in an age of smartphones. (2016). [Place of publication not identified]:
Palgrave Pivot.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.