Enhancing Front-End Security: Protecting User Data and Privacy in Web Applications

被引:0
|
作者
Tkachenko, Oleksandr [1 ]
Goncharov, Vadim [2 ]
Jatkiewicz, Przemyslaw [3 ]
机构
[1] Playtech, Sofia, Bulgaria
[2] Your Next Agcy, Amsterdam, Netherlands
[3] Univ Gdansk, Fac Management, Sopot, Poland
关键词
authentication mechanisms; data encryption; development of internet resources; special effects; vulnerabilities in web applications;
D O I
10.1002/cav.70003
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Conducting research on this subject remains relevant in light of the rapid development of technology and the emergence of new threats in cybersecurity, requiring constant updating of knowledge and protection methods. The purpose of the study is to identify effective front-end security methods and technologies that help ensure the protection of user data and their privacy when using web applications or sites. A methodology that defines the steps and processes for effective front-end security and user data protection is developed. The research identifies the primary security threats, including cross-site scripting (XSS), cross-site request forgery (CSRF), and SQL injections, and evaluates existing front-end security methods such as Content Security Policy (CSP), HTTPS, authentication, and authorization mechanisms. The findings highlight the effectiveness of these measures in mitigating security risks, providing a clear assessment of their advantages and limitations. Key recommendations for developers include the integration of modern security protocols, regular updates, and comprehensive security training. This study offers practical insights to improve front-end security and enhance user data protection in an evolving digital landscape.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Exploration of Web front-end development technology and optimization direction
    Fu, Cuiyu
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 153 - 156
  • [32] RF Front-End Tunability for LTE Handset Applications
    Whatley, Richard
    Ranta, Tero
    Kelly, Dylan
    2010 IEEE COMPOUND SEMICONDUCTOR INTEGRATED CIRCUIT SYMPOSIUM (CSICS), 2010,
  • [33] End User Security & Privacy Concerns with Smart Homes
    Zeng, Eric
    Mare, Shrirang
    Roesner, Franziska
    PROCEEDINGS OF THIRTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2017), 2017, : 65 - 80
  • [34] Optimization scheme based on web front-end load balancing
    Gao Yuan
    Huang Mengxing
    2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 88 - 94
  • [35] Monolithic front-end system for photon timing applications
    Rech, Ivan
    Cammi, Corrado
    Gulinatti, Angelo
    Ghioni, Massimo
    Cova, Sergio
    2009 IEEE LEOS ANNUAL MEETING CONFERENCE PROCEEDINGS, VOLS 1AND 2, 2009, : 299 - +
  • [36] A software-radio front-end for microwave applications
    Streifinger, A
    Müller, T
    Luy, JF
    Biebl, EM
    2003 TOPICAL MEETING ON SILICON MONOLITHIC INTEGRATED CIRCUITS IN RF SYSTEMS, DIGEST OF PAPERS, 2003, : 53 - 56
  • [37] RF Front-End Transmitting System for Agricultural Applications
    Pech, Phanam
    Saron, Samdy
    Chaudhary, Girdhari
    Shin, Yu Kyeong
    Lee, Jun Gu
    Jeong, Yongchae
    2022 IEEE INTERNATIONAL SYMPOSIUM ON RADIO-FREQUENCY INTEGRATION TECHNOLOGY (RFIT 2022), 2022, : 216 - 218
  • [38] An Analog Integrated Front-End Amplifier For Neural Applications
    Zhou, Zhijun
    Warr, Paul
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2016, : 135 - 139
  • [39] An Inductorless Receiver Front-End For Multiband Wireless Applications
    Sharma, Priyanka
    Pandey, Sunil
    Dwaramwar, Pravin A.
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [40] Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles
    Beigi, Ghazaleh
    Guo, Ruocheng
    Nou, Alexander
    Zhang, Yanchao
    Liu, Huan
    PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19), 2019, : 213 - 221