Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: https://dspace.kmf.uz.ua/jspui/handle/123456789/5819
Назва: Database protection in Web applications
Автори: Holovács József
Головач Йожеф
Dorovtsi Adam
Доровці Адам
Daróci Ádám
Ключові слова: Web applications;database (DB)
Дата публікації: 2025
Видавництво: II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem
Вид документа: dc.type.conferenceAbstract
Бібліографічний опис: In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 106-107.
Короткий огляд (реферат): Abstract. Web applications are widely used in business, science, and everyday life. The main element that ensures the storage and processing of information is the database (DB). However, the database is often the weakest link in the structure of information systems. Attackers use various methods that can lead to data leakage, forgery, or destruction. Therefore, ensuring the security of databases in web applications is of critical importance. Main Threats to Database Security  SQL Injections. This is one of the most common attacks, in which an attacker inserts specially crafted SQL code into a form or URL that is then executed by the database. As a result, the attacker may gain unauthorized access, modify, or delete data.  XSS (Cross-Site Scripting). In this case, a malicious JavaScript script is embedded into a web page. When a user opens the page, the script executes in their browser, which can lead to the theft of cookies, passwords, or session data.  DoS/DDoS Attacks. These attacks aim to overload the server with a large number of requests. In the case of DDoS, requests come simultaneously from many devices, making the web application and its database inaccessible to legitimate users.  Unauthorized Access. Attackers often try to guess or steal administrator and user passwords. Weak passwords and the absence of multi-factor authentication significantly increase the risk of system compromise.  Data Leakage. Misconfigured servers or lack of encryption during data transmission (for instance, absence of HTTPS) can result in sensitive information being intercepted. Methods for Database Protection  Parameterized Queries. The use of prepared statements instead of dynamically generated SQL queries effectively prevents SQL injections.  Validation and Filtering of Input Data. Checking the format, length, and data type helps reduce the risk of injecting malicious code.  Protection Against XSS. Implemented through HTML character escaping, Content Security Policy (CSP), and input sanitization.  Access Control. Applying the principle of least privilege and multi-factor authentication protects the system from both internal and external threats.  Encryption. Employing TLS/SSL for data transmission and storing passwords in a hashed and salted form enhances data confidentiality.
Опис: Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/
URI (Уніфікований ідентифікатор ресурсу): https://dspace.kmf.uz.ua/jspui/handle/123456789/5819
ISBN: 978-617-8143-50-3 (puhatáblás)
978-617-8143-51-0 (PDF)
metadata.dc.rights.uri: http://creativecommons.org/licenses/by-nc-nd/3.0/us/
Розташовується у зібраннях:A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben
Daróci Ádám
Holovács József

Файли цього матеріалу:
Файл Опис РозмірФормат 
Database_protection_in_web_applications_2025.pdfIn Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 106-107.10.01 MBAdobe PDFПереглянути/Відкрити


Ліцензія на матеріал: Ліцензія Creative Commons Creative Commons