Academic Journals Database
Disseminating quality controlled scientific knowledge

To Study and Explain the Different Methods to Built a Secure Web Application

Author(s): Parveen Kumar

Journal: International Journal of Computer Science and Management Studies
ISSN 2231-5268

Volume: 12;
Issue: 02;
Start page: 351;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Information Security | Secure Web

The secure web application is the most important thing for any type of transaction or similar things. Information security should enable, to the extent possible, a business to take the risks it is prepared to take on, by designing and deploying countermeasuresthat allow for sensible business risk. Additionally, seemingly small exposures should be dealt with if there is a business case. The role of the security architecture is not to steer the business away from risk, but rather to educate their business partners about therisks they are taking and provide countermeasures that enable the business to take as much risk as suits their goals. This is very important, it is no longer acceptable for enterprise security to exclusively function as an arbiter; security in the enterprise needs architecture and design advocates, and backing at runtime.Security policy and standards are not end goals in themselves, they need to be backed by a governance model that ensures they are in use, and that it is practically possible to build, deploy, and operate systems based on their intent. In practice this meansthat the security architecture must define reusable security services that allow developers to not be security experts yet still build a secure system.
Affiliate Program     

Tango Rapperswil
Tango Rapperswil