Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2926
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Herath, H M P Kavinda Ranjan Kumara | - |
dc.date.accessioned | 2022-08-24T06:41:09Z | - |
dc.date.available | 2022-08-24T06:41:09Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2926 | - |
dc.description.abstract | Web application security is the most controversial and crucial factor to be concentrated on considering the security aspect of cyberspace. Cryptography takes critical parts of security by implementing encryption and decryption phenomena on data at rest, in moving, and in use to be protected the security breaches. Cryptographic concepts had developed over the last few decades as a result of well-known series of mathematical and logical functions. Weakness of poor programming techniques or leakiness of traditional software development life cycles is a crucial element of the security vulnerabilities that can be a huge impact on several web applications which are currently in existence. The cryptographic vulnerabilities of the web application would depend on several factors such as lack of knowledge on particular subject matters of cryptography, least privilege and contribution of security techniques while cording, unable to proceed with proper standardized vulnerability assessment criteria, the improper adaptation of cryptographic concepts, unable to intended with high secure framework like DevSecOps, depend on the procedures rather than empirical approaches, etc. Sophisticated tools and techniques are necessary factors of driving through the rectification and mitigation of the security vulnerabilities that exist in the web applications whereas implementation process, testing and monitoring of the System Development Life Cycle. This dissertation emphasized indeed a further illustration of cryptographic vulnerability assessment in several specimens collected from different domains from enterprise web applications and related APIs (Application Protocol Interface) currently established. The tools are the critical elements used to evaluate errors on the codes whereas statistical or dynamic analysis. Static tools are given in high percentage of accuracy of the results whereas automated tools are well suited for mega scripting projects such as millions of code evaluated for errors. Java-based code scripting has been dominated still among the huge percentage of the web sources. Python will be established gradually due to the high inbuilt security system on it. Java and Python are the programming languages still being dominated of existence to discuss in the cryptographic vulnerabilities on the process of web application developments. The ultimate goal of this dissertation could be retain valuable sources of documents enriched with sophisticated technics to be used a reference guide for the developers and the security engineers to fulfilled their gaps between code and security requirements | en_US |
dc.language.iso | en | en_US |
dc.subject | Application Protocol Interface | en_US |
dc.subject | Cryptographic Vulnerability | en_US |
dc.subject | DevSecOps | en_US |
dc.subject | Dynamic Analysis | en_US |
dc.subject | Statistical Analysis System Development Life Cycle | en_US |
dc.title | Cryptographic Issues and Vulnerabilities in Web Applications | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | MSc 2021 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
MS20911058_IT6010_Project.pdf Until 2050-12-31 | 9.55 MB | Adobe PDF | View/Open Request a copy | |
MS20911058_IT6010_Project_Abs.pdf | 65 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.