{"title":"网络安全的脆弱性及应对商业应用潜在威胁的策略","authors":"Muhammad Altaf Mukati, Syed Muzammil Ali","doi":"10.31645/.2014.12.1.9","DOIUrl":null,"url":null,"abstract":"Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications\",\"authors\":\"Muhammad Altaf Mukati, Syed Muzammil Ali\",\"doi\":\"10.31645/.2014.12.1.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.\",\"PeriodicalId\":412730,\"journal\":{\"name\":\"Journal of Independent Studies and Research Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Independent Studies and Research Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31645/.2014.12.1.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Independent Studies and Research Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31645/.2014.12.1.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
Web technology has become an important part of online business such as sharing information, social interaction, activities related to business especially online payment methods, credit card information, bank transactions, online banking and many other applications. The exponential use of web technology introduces new possibilities of criminal activities and creates unbearable threats to the information and business trades. This is mainly because of the widely use of the World Wide Web and cloud computing for information sharing and saving regardless of the user. As technology grows with the passage of time, the web technology becomes more advanced and complex in terms of security and privacy and drives new challenges and threats which makes the internet unsafe for business applications. Many of the currently available applications have loopholes which makes cyber criminals to exploit the applications easily. The main vulnerabilities are Cyber theft, vandalism, web jacking, credit card information stolen, privacy and security issues, cyber terrorism, spam and etc. An ongoing challenge related to cyber security community is related to handle the transition of technology to commercial or open source web applications available in the market. This paper provides the strategy to overcome the vulnerabilities and potential threats to the business applications.