Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/2835
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHerath, H M P Kavinda Ranjan Kumara-
dc.date.accessioned2022-07-26T04:44:03Z-
dc.date.available2022-07-26T04:44:03Z-
dc.date.issued2021-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/2835-
dc.description.abstractWeb application security is the most controversial and crucial factor to be concentrated on considering the security aspect of cyberspace. Cryptography takes critical parts of security by implementing encryption and decryption phenomena on data at rest, in moving, and in use to be protected the security breaches. Cryptographic concepts had developed over the last few decades as a result of well-known series of mathematical and logical functions. Weakness of poor programming techniques or leakiness of traditional software development life cycles is a crucial element of the security vulnerabilities that can be a huge impact on several web applications which are currently in existence. The cryptographic vulnerabilities of the web application would depend on several factors such as lack of knowledge on particular subject matters of cryptography, least privilege and contribution of security techniques while cording, unable to proceed with proper standardized vulnerability assessment criteria, the improper adaptation of cryptographic concepts, unable to intended with high secure framework like DevSecOps, depend on the procedures rather than empirical approaches, etc. Sophisticated tools and techniques are necessary factors of driving through the rectification and mitigation of the security vulnerabilities that exist in the web applications whereas implementation process, testing and monitoring of the System Development Life Cycle. This dissertation emphasized indeed a further illustration of cryptographic vulnerability assessment in several specimens collected from different domains from enterprise web applications and related APIs (Application Protocol Interface) currently established. The tools are the critical elements used to evaluate errors on the codes whereas statistical or dynamic analysis. Static tools are given in high percentage of accuracy of the results whereas automated tools are well suited for mega scripting projects such as millions of code evaluated for errors. Java-based code scripting has been dominated still among the huge percentage of the web sources. Python will be established gradually due to the high inbuilt security system on it. Java and Python are the programming languages still being dominated of existence to discuss in the cryptographic vulnerabilities on the process of web application developments. The ultimate goal of this dissertation could be retain valuable sources of documents enriched with sophisticated technics to be used a reference guide for the developers and the security engineers to fulfilled their gaps between code and security requirementsen_US
dc.language.isoenen_US
dc.subjectApplication Protocol Interfaceen_US
dc.subjectCryptographic Vulnerabilityen_US
dc.subjectDevSecOpsen_US
dc.subjectDynamic Analysisen_US
dc.subjectStatistical Analysis System Development Life Cycleen_US
dc.titleCryptographic Issues and Vulnerabilities in Web Applicationsen_US
dc.typeThesisen_US
Appears in Collections:2021

Files in This Item:
File Description SizeFormat 
MS20911058_IT6010_Project.pdf
  Until 2050-12-31
9.55 MBAdobe PDFView/Open Request a copy
MS20911058_IT6010_ProjectAbs.pdf65 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.