sponsored by Logicalis
Posted:  11 Dec 2008
Published:  11 Dec 2008
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
Research has shown that a vast number of Web sites are vulnerable to Web application attacks and that a great percentage of these attacks occur over the HTTP/S protocols, ports that are often exposed to the entire online community. With these facts in mind, it's essential for organizations to take serious measures to help secure their Web applications. As Web applications become increasingly complex, tremendous amounts of sensitive data--including personal, medical and financial information--are exchanged and stored. Consumers expect and even demand that this information be kept secure. This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.


Danny Allan
Strategic Research Analyst ,  IBM Software Group

Customer Data Management | Customer Privacy | HTTP | HTTPS | Penetration Testing | Security Threats | Software | Vulnerability Assessments | Web Application Security

View All Resources sponsored by Logicalis

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement