Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

Web-Based Vulnerabilities and Data Breaches: A Case Study
Group - 4Vamshi Krishna Ganam Meghana Janagam Surendra Yarra

Start

Can lead to stealing user data, taking control of the user's session, or defacing the website

Can happen when a web application uses user input to generate dynamic content, such as JavaScript or HTML

Occur when a web application allows user input to be executed as code

Active Content Vulnerabilities

SQL Injection

SQL Injection

Occur when an attacker injects malicious SQL code into a web application's database

Can lead to accessing sensitive data, modifying data, or taking control of the database

Exposure of customer data, leading to identity theft and financial lossPotential legal and regulatory consequences, such as fines and lawsuits Financial loss due to the cost of remediation and recovery

Impact on the Organization

Parameterized queries to prevent SQL injection attacksSecure coding practices, such as input validation and error handlingSecure configuration, including the use of secure protocols and encryption

Detection Methods and Prevention Strategies

British Airways (2018): A data breach affected the personal and financial information of approximately 500,000 customers.

Equifax (2017): A major data breach compromised the personal information of over 147 million individuals.a

Target (2013): A significant data breach exposed the personal information of millions of customers

Recent Breach Examples

Sections like this help you create order
  • Active content vulnerabilities, SQL injection, and webpage defacements are serious threats to web applications
  • These threats can have significant consequences for organizations, including financial loss and damage to reputation
  • Implementing security measures, such as input validation and secure coding practices, can help prevent these threats

Conclusion