Techniques for Securing Web Content

Authors

  • Cristian Ursu

Keywords:

web, content, data, information, knowledge, data mining, crawler, protection

Abstract

This paper analyzes the dangers to which web content is exposed, demonstrates how data from the Internet can be gathered and used to obtain profit, how an application can stealthily make use of complicated processing without implementing them and how a website can be cloned in real time. For the considered attacks and vulnerabilities I present, explain, group and evaluate the existing solutions to secure content and last but not least, I suggest a new solution: a library for link encryption.

References

[Frederick Li, Jianmin Zhao - "Advances in Web-based Learning, ICWL 2008: 7th International Conference, Jinhua, China, August 20-22, 2008", Springer, September 2008, p 73-74;

Anna Bentkowska-Kafel,Drew Baker,Hugh Denard - "Paradata and Transparency in Virtual Heritage", Ashgate, 2012 p 171-172;

Dafydd Stuttard, Marcus Pinto - "The Web Application Hacker's Handbook", Wiley Publishing, Inc., 2007, p 38, 45-46, 95;

John R. Vacca - "Computer and Information Security Handbook", Morgan Kaufmann, May 29 2009, p 739;

Vijay Atluri, Claudia Diaz - "Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14", Springer, December 2011, p 121;

Kim Zetter - Article "Vulnerabilities Allow Attacker to Impersonate Any Website" , July 29, 2009 link http://www.wired.com/threatlevel/2009/07/kaminsky ;

Chris Sanders - Article " Understanding Man-In-The-Middle Attacks – Part2: DNS Spoofing", April 2010, link http://www.windowsecurity.com/articles/understanding-man-in-the-middle-attacks-arp-part2.html

Monica Kilian PhD - Article "Cybersquatting and Trademark Infringement " , link http://www.murdoch.edu.au/elaw/issues/v7n3/kilian73_text.html;

Amrit Tiwana - "Web Security", Digital Press, 1999, p 53;

http://www.facebook.com/legal/terms;

Terry Jepson - " Protecting Your Web Site" http://www.wiscocomputing.com/articles/protect_web_sites.htm;

http://www.checkforplagiarism.net;

http://www.affiliatebeginnersguide.com/articles/page_content.html;

Joshua Dorkin, Article "How to Protect Your Website’s Copyright When Someone Steals Your Content" , December 10, 2006, link http://www.timeforblogging.com/2006/12/10/how-to-protect-your-websites-copyright-when-someone-steals-your-content;

https://addons.mozilla.org/en-US/firefox/addon/imacros-for-firefox;

Mike Andrews, James A. Whittaker - "How to Break Web Software: Functional And Security Testing of Web Applications And Web Services", Addison-Wesley Professional, 2006, p 74-76;

John Wiley - "Security Engineering: A Guide to Building Dependable Distributed Systems", Wiley Publishing, Inc., November 2008, p 94;

http://decaptchablog.com/ocr-vs-decaptcha-services;

http://google.com/recaptcha/learnmore

Paco Hope, Ben Walther - "Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast", O'Reilly Media, October 2008, p 87;

Workman, Daniel Phelps, John Gathegi - "Information Security for Managers", Jones & Bartlett Publishers, February 2012, p 422;

Stephen Burgess,Carmine Sellitto,Stan Karanasios - "Effective Web Presence Solutions for Small Businesses: Strategies for Successful Implementation", Idea Group Inc (IGI), 2009, p 265;

Gerry McGovern,Rob Norton - "Content Critical: Gaining Competitive Advantage Through High-Quality Web Content", Financial Times Prentice Hall, November 28, 2001, p 27;

Downloads

Additional Files

Published

2012-06-30

How to Cite

Ursu, C. (2012). Techniques for Securing Web Content. Journal of Mobile, Embedded and Distributed Systems, 4(2), 63-79. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Techniques_for_Securing_Web_Content