Techniques for Securing Web Content
Keywords:
web, content, data, information, knowledge, data mining, crawler, protectionAbstract
This paper analyzes the dangers to which web content is exposed, demonstrates how data from the Internet can be gathered and used to obtain profit, how an application can stealthily make use of complicated processing without implementing them and how a website can be cloned in real time. For the considered attacks and vulnerabilities I present, explain, group and evaluate the existing solutions to secure content and last but not least, I suggest a new solution: a library for link encryption.
References
[Frederick Li, Jianmin Zhao - "Advances in Web-based Learning, ICWL 2008: 7th International Conference, Jinhua, China, August 20-22, 2008", Springer, September 2008, p 73-74;
Anna Bentkowska-Kafel,Drew Baker,Hugh Denard - "Paradata and Transparency in Virtual Heritage", Ashgate, 2012 p 171-172;
Dafydd Stuttard, Marcus Pinto - "The Web Application Hacker's Handbook", Wiley Publishing, Inc., 2007, p 38, 45-46, 95;
John R. Vacca - "Computer and Information Security Handbook", Morgan Kaufmann, May 29 2009, p 739;
Vijay Atluri, Claudia Diaz - "Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14", Springer, December 2011, p 121;
Kim Zetter - Article "Vulnerabilities Allow Attacker to Impersonate Any Website" , July 29, 2009 link http://www.wired.com/threatlevel/2009/07/kaminsky ;
Chris Sanders - Article " Understanding Man-In-The-Middle Attacks – Part2: DNS Spoofing", April 2010, link http://www.windowsecurity.com/articles/understanding-man-in-the-middle-attacks-arp-part2.html
Monica Kilian PhD - Article "Cybersquatting and Trademark Infringement " , link http://www.murdoch.edu.au/elaw/issues/v7n3/kilian73_text.html;
Amrit Tiwana - "Web Security", Digital Press, 1999, p 53;
http://www.facebook.com/legal/terms;
Terry Jepson - " Protecting Your Web Site" http://www.wiscocomputing.com/articles/protect_web_sites.htm;
http://www.checkforplagiarism.net;
http://www.affiliatebeginnersguide.com/articles/page_content.html;
Joshua Dorkin, Article "How to Protect Your Website’s Copyright When Someone Steals Your Content" , December 10, 2006, link http://www.timeforblogging.com/2006/12/10/how-to-protect-your-websites-copyright-when-someone-steals-your-content;
https://addons.mozilla.org/en-US/firefox/addon/imacros-for-firefox;
Mike Andrews, James A. Whittaker - "How to Break Web Software: Functional And Security Testing of Web Applications And Web Services", Addison-Wesley Professional, 2006, p 74-76;
John Wiley - "Security Engineering: A Guide to Building Dependable Distributed Systems", Wiley Publishing, Inc., November 2008, p 94;
http://decaptchablog.com/ocr-vs-decaptcha-services;
http://google.com/recaptcha/learnmore
Paco Hope, Ben Walther - "Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast", O'Reilly Media, October 2008, p 87;
Workman, Daniel Phelps, John Gathegi - "Information Security for Managers", Jones & Bartlett Publishers, February 2012, p 422;
Stephen Burgess,Carmine Sellitto,Stan Karanasios - "Effective Web Presence Solutions for Small Businesses: Strategies for Successful Implementation", Idea Group Inc (IGI), 2009, p 265;
Gerry McGovern,Rob Norton - "Content Critical: Gaining Competitive Advantage Through High-Quality Web Content", Financial Times Prentice Hall, November 28, 2001, p 27;
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The author(s) is responsible for the correctness and legality of the paper content.
- Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.
- It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.
- The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.
JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://jmeds.eu.
Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice.