Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Date Added: Oct 2014
A complex combination of curiosity, competition, classic boredom and espionage lead humans to use computer applications in ways unintended, leading (in some cases) to serious security breaches and the need to secure compromised applications from further attacks. With the emergence of web 2.0, information sharing through social networking has increased and the business adoption of the web as a means of doing business and delivering service has greatly increased, which has led to the attack of websites directly. As a result, industry is paying increased attention to the security of the web applications themselves in addition to the security of the underlying computer network and operating systems.