JavaScript Security

By: aathishankaran Emailed: 1728 times Printed: 2329 times    

Latest comments
By: rohit kumar - how this program is work
By: Kirti - Hi..thx for the hadoop in
By: Spijker - I have altered the code a
By: ali mohammed - why we use the java in ne
By: ali mohammed - why we use the java in ne
By: mizhelle - when I exported the data
By: raul - no output as well, i'm ge
By: Rajesh - thanx very much...
By: Suindu De - Suppose we are executing

As a web content developer and as a user, the Internet Security Threats that you face depend on who you are and what you have to Protect.

For example, if you are the Webmaster for a high-profile Organization, such as the CIA or the U.S. Department of Justice, Then you'll be the target of all those hackers merely for the Challenge you present; many hackers want the fame associated with Penetrating one of the big people. Even if you're Website is not in the hackers "Top 40," if it is not well protected, it may be penetrated just because it is an easy target. 

If your Website is involved with any type of financial transactions or controls any valuable assets, directly or even indirectly then it could be the target of a more professional type of Criminal than the recreational hacker. These cyber thieves may try to penetrate your Web site in order to get access to such Things as credit card numbers, software, sensitive information, Or physical assets, such as products that may be purchased through your Website. An attack on your Web site may be the first stage of a concerted Attack on your organization as a whole. 

If your Web server is inside your organization's firewall, then a penetration of your Web server could lead to a serious security breach of site- Internal networks. If your Web server is outside your organization Firewall, then an attacker may attempt to install clandestine software to monitor network traffic at the firewall's external interface. 

Due to the growing importance of the Web to commerce, a company's ability to conduct business can be affected by attacks on its Web site. While most businesses don't prey on each other through the Internet, a third party could manipulate a company's Web presence to reap financial gain. 

Threats to the Web User 

The security threats faced by the individual user are somewhat different than those of the Webmaster. First of all there isn't much prestige in breaking into someone's PC. This rules out some, but not all, recreational hackers. If someone wants to get access to your PC, then it is probably someone who is intent on collecting information about you or sabotaging the data on your PC. This special someone could be an acquaintance, a competitor, or anyone else who has an interest in knowing or stopping what you're doing. Due to the rise of electronic commerce on the Web, some electronic pickpockets have surfaced. These smalltime cyber thieves snoop on users' PCs in order to collect credit card numbers, passwords, and information that can be used to forge digital certificates. 

Most indiscriminate attacks on individuals come in the form of malicious software, such as viruses-yes, they are still out there. Future attacks will probably include executable Web content (JavaScript, Java, ActiveX) and executable e-mail, such as that provided by Netscape Messenger, Outlook, and other mail programs.


JSP Home | All JSP Tutorials | Latest JSP Tutorials

Sponsored Links

If this tutorial doesn't answer your question, or you have a specific question, just ask an expert here. Post your question to get a direct answer.



Bookmark and Share

Comments(0)


Be the first one to add a comment

Your name (required):


Your email(required, will not be shown to the public):


Your sites URL (optional):


Your comments:



More Tutorials by aathishankaran
Web Security Issues
The Web User's Perspective
Server-side plug-Ins
The best way to avoid security vulnerabilities with new server
JavaScript Security
Window Object
Working with Status Bar Messages
Retrieving a Portion of a String
Referencing Windows
Math Object
Frame Object
Document Object
Closing Windows
Built-in Object in Javascript
Textarea Object

More Tutorials in JSP
LifecycleException: service.getName(): "Catalina"; Protocol handler start failed: `java.net.BindException: Permission denied <null>:80
JSP Alert Example
JSP CheckBox Example
Uploading an Image to a Database using JSP
Uploading a file to a server using JSP
A JSP page that gets properties from a bean
The page Directive in JSP
The taglib, tag, include, attribute and the variable Directive in JSP
Declarations in JSP
Scriptlets and Expressions in JSP
Tag Libraries in JSP
The Request Object in JSP
The Response Object in JSP
The Out Object in JSP
The Session Object in JSP

More Latest News
Most Viewed Articles (in JSP )
JSP Example to connect to MS SQL database and retrieve records
What are the different scopes in JSP?
JSP Alert Example
JSP CheckBox Example
JSP Program for display Date
Comparison operators in JSP
Math Object
The Request Object in JSP
Form processing in JSP
Protecting your website with a login page
Textarea Object
The best way to avoid security vulnerabilities with new server
Server-side plug-Ins
Web Security Issues
JSP Example to connect to MS SQL database using Tomcat Connection Pool
Most Emailed Articles (in JSP)
The Servlet Life Cycle
Drawbacks of the JSP Model 1 Architecture
Working with Status Bar Messages
Embedding a QuickTime movie in a JSP
Embedding MP3 audio file in a JSP
LifecycleException: service.getName(): "Catalina"; Protocol handler start failed: `java.net.BindException: Permission denied <null>:80
What is JSP?
Cookies using JSP or Java Bean
Click to Activate and Use this control
The JSP Program running first Time.
Scriptlets
Server Side Programming
Syntax For JSP Declaratives
Embedding java codes in jsp sciptlets
Tags using in jsp