Enhancing Front-End Security: Protecting User Data and Privacy in Web Applications

被引:0
|
作者
Tkachenko, Oleksandr [1 ]
Goncharov, Vadim [2 ]
Jatkiewicz, Przemyslaw [3 ]
机构
[1] Playtech, Sofia, Bulgaria
[2] Your Next Agcy, Amsterdam, Netherlands
[3] Univ Gdansk, Fac Management, Sopot, Poland
关键词
authentication mechanisms; data encryption; development of internet resources; special effects; vulnerabilities in web applications;
D O I
10.1002/cav.70003
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Conducting research on this subject remains relevant in light of the rapid development of technology and the emergence of new threats in cybersecurity, requiring constant updating of knowledge and protection methods. The purpose of the study is to identify effective front-end security methods and technologies that help ensure the protection of user data and their privacy when using web applications or sites. A methodology that defines the steps and processes for effective front-end security and user data protection is developed. The research identifies the primary security threats, including cross-site scripting (XSS), cross-site request forgery (CSRF), and SQL injections, and evaluates existing front-end security methods such as Content Security Policy (CSP), HTTPS, authentication, and authorization mechanisms. The findings highlight the effectiveness of these measures in mitigating security risks, providing a clear assessment of their advantages and limitations. Key recommendations for developers include the integration of modern security protocols, regular updates, and comprehensive security training. This study offers practical insights to improve front-end security and enhance user data protection in an evolving digital landscape.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A novel TV/FM front-end for multimedia applications
    Brekelmans, H
    Keibel, J
    Weltersbach, W
    INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 1997 DIGEST OF TECHNICAL PAPERS, 1997, : 284 - 285
  • [42] Managing event traces for a web front-end to a parallel simulation
    Gan, BP
    Liu, L
    Ji, ZR
    Turner, SJ
    Cai, WT
    WSC'01: PROCEEDINGS OF THE 2001 WINTER SIMULATION CONFERENCE, VOLS 1 AND 2, 2001, : 637 - 644
  • [43] Reconfigurable front-end antennas for cognitive radio applications
    Tawk, Y.
    Bkassiny, M.
    El-Howayek, G.
    Jayaweera, S. K.
    Avery, K.
    Christodoulou, C. G.
    IET MICROWAVES ANTENNAS & PROPAGATION, 2011, 5 (08) : 985 - 992
  • [44] A 2.5 THz receiver front-end for spaceborne applications
    Gaidis, MC
    Pickett, HM
    Siegel, PH
    Smith, CD
    Smith, RP
    Martin, SC
    THE NINETY EIGHT - 1998 IEEE SIXTH INTERNATIONAL CONFERENCE ON TERAHERTZ ELECTRONICS PROCEEDINGS, 1996, : 13 - 17
  • [45] Tunable directional coupler for RF front-end applications
    Solomko, V.
    Tanc, B.
    Kehrer, D.
    Ilkov, N.
    Bakalski, W.
    Simbuerger, W.
    ELECTRONICS LETTERS, 2015, 51 (24) : 2012 - 2013
  • [46] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [47] OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect
    Li, Wanpeng
    Mitchell, Chris J.
    Chen, Thomas
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 35 - 44
  • [48] A Scanner Darkly: Protecting User Privacy From Perceptual Applications
    Jana, Suman
    Narayanan, Arvind
    Shmatikov, Vitaly
    2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 349 - 363
  • [49] IFML: Building the Front-End of Web and Mobile Applications with OMG's Interaction Flow Modeling Language
    Brambilla, Marco
    WEB ENGINEERING, ICWE 2014, 2014, 8541 : 575 - 576
  • [50] Designing a Sketch Recognition Front-End: User Perception of Interface Elements
    Wais, Paul
    Wolin, Aaron
    Alvarado, Christine
    SKETCH-BASED INTERFACES AND MODELING 2007, 2007, : 99 - 106