Please use this identifier to cite or link to this item: https://dspace.kmf.uz.ua/jspui/handle/123456789/5819
Title: Database protection in Web applications
Authors: Holovács József
Головач Йожеф
Dorovtsi Adam
Доровці Адам
Daróci Ádám
Keywords: Web applications;database (DB)
Issue Date: 2025
Publisher: II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem
Type: dc.type.conferenceAbstract
Citation: In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 106-107.
Abstract: Abstract. Web applications are widely used in business, science, and everyday life. The main element that ensures the storage and processing of information is the database (DB). However, the database is often the weakest link in the structure of information systems. Attackers use various methods that can lead to data leakage, forgery, or destruction. Therefore, ensuring the security of databases in web applications is of critical importance. Main Threats to Database Security  SQL Injections. This is one of the most common attacks, in which an attacker inserts specially crafted SQL code into a form or URL that is then executed by the database. As a result, the attacker may gain unauthorized access, modify, or delete data.  XSS (Cross-Site Scripting). In this case, a malicious JavaScript script is embedded into a web page. When a user opens the page, the script executes in their browser, which can lead to the theft of cookies, passwords, or session data.  DoS/DDoS Attacks. These attacks aim to overload the server with a large number of requests. In the case of DDoS, requests come simultaneously from many devices, making the web application and its database inaccessible to legitimate users.  Unauthorized Access. Attackers often try to guess or steal administrator and user passwords. Weak passwords and the absence of multi-factor authentication significantly increase the risk of system compromise.  Data Leakage. Misconfigured servers or lack of encryption during data transmission (for instance, absence of HTTPS) can result in sensitive information being intercepted. Methods for Database Protection  Parameterized Queries. The use of prepared statements instead of dynamically generated SQL queries effectively prevents SQL injections.  Validation and Filtering of Input Data. Checking the format, length, and data type helps reduce the risk of injecting malicious code.  Protection Against XSS. Implemented through HTML character escaping, Content Security Policy (CSP), and input sanitization.  Access Control. Applying the principle of least privilege and multi-factor authentication protects the system from both internal and external threats.  Encryption. Employing TLS/SSL for data transmission and storing passwords in a hashed and salted form enhances data confidentiality.
Description: Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/
URI: https://dspace.kmf.uz.ua/jspui/handle/123456789/5819
ISBN: 978-617-8143-50-3 (puhatáblás)
978-617-8143-51-0 (PDF)
metadata.dc.rights.uri: http://creativecommons.org/licenses/by-nc-nd/3.0/us/
Appears in Collections:A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben
Daróci Ádám
Holovács József

Files in This Item:
File Description SizeFormat 
Database_protection_in_web_applications_2025.pdfIn Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 106-107.10.01 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons