sponsored by IBM
Posted:  13 Feb 2009
Published:  13 Feb 2009
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
Research has shown that a vast number of Web sites are vulnerable to Web application attacks and that a great percentage of these attacks occur over the HTTP/S protocols, ports that are often exposed to the entire online community. With these facts in mind, it's essential for organizations to take serious measures to help secure their Web applications.

As Web applications become increasingly complex, tremendous amounts of sensitive data-including personal, medical and financial information-are exchanged and stored. Consumers expect and even demand that this information be kept secure. There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.



Author

Danny Allan
Strategic Research Analyst ,  IBM Software Group



BROWSE RELATED RESOURCES
Passwords | Security Software | Vulnerability Assessments | Web Application Security | Web Browsers

View All Resources sponsored by IBM

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement