9th International Science Congress (ISC-2019).  International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Technical Problems Especially Web Security Related With World Wide Web

Author Affiliations

  • 1 Sainath University, Ranchi, INDIA

Res. J. Engineering Sci., Volume 1, Issue (4), Pages 53-56, October,26 (2012)

Abstract

The World Wide Web (or the proper World-Wide Web; abbreviated as WWW or W3, and commonly known as the Web is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks. Many formal standards and other technical specifications and software define the operation of different aspects of the World Wide Web, the Internet, and computer information exchange. Many of the documents are the work of the World Wide Web Consortium (W3C), headed by Berners-Lee, but some are produced by the Internet Engineering Task Force (IETF) and other organizations. Usually, when web standards are discussed, the following publications are seen as foundational: Recommendations for markup languages, especially HTML and XHTML, from the W3C. These define the structure and interpretation of hypertext documents. Recommendations for stylesheets, especially CSS, from the W3C. Standards for ECMAScript (usually in the form of JavaScript), from Ecma International. Recommendations for the Document Object Model, from W3C. Security threats to web sites and web applications (webapps) come in many forms. Data centres and other assets used for hosting web sites and their associated systems need to be protected from all types of threat. Threats should be identified using application threat modelling and then evaluated with a vulnerability assessment. Vulnerabilities can be removed or reduced and countermeasures put in place to mitigate the effects of an incident should the threat be realized. Some of them are security policies, using technology, content filtering.

References

  1. NCSA Mosaic September 10, 1993 Demo. Totic.org. http://totic.org/nscp/demodoc/demo.html. Retrieved July 27 (2012)
  2. Vice President Al Gore's ENIAC Anniversary SpeechCs.washington.edu. February 14, 1996. http://cs.washington.edu/homes/lazowska/faculty.lecture/innovation/gore.html. Retrieved July 27, (2009)
  3. Internet legal definition of Internet, West's Encyclopedia of American Law, edition 2, Free Online Law Dictionary, July 15, 2009. http://legal-dictionary.thefreedictionary.com/Internet, Retrieved November 25, (2008)
  4. WWW (World Wide Web) Definition, TechTerms, http://techterms.com/definition/www. Retrieved february 19 (2010)
  5. The W3C Technology Stack, World Wide Web Consortium. http://www.w3.org/Consortium/technology. Retrieved April 21, (2009)
  6. Hamilton Naomi, (July 31, 2008), The A-Z of Programming Languages: JavaScript, Computerworld, IDG, http://computerworld.com.au/article/255293/-z_programming_languages_javascript.Retrieved May 12, (2009)
  7. Buntin Seth, (23 September 2008), jQuery Polling plugin, http://buntin.org/2008/sep/23/jquery-polling-plugin/, Retrieved 2009-08-22 (2009)
  8. Berners-Lee, Tim, Frequently asked questions by the Press, W3C, http://w3.org/People/Berners-Lee/FAQ.html, Retrieved July 27, (2009)
  9. automatically adding www.___.com, mozillaZine. May 16, 2003. http://forums.mozillazine.org/viewtopic.php?f=9&t=10980. Retrieved May 27, 2009.
  10. Masnick Mike, (July 7, 2008), Microsoft Patents Adding 'www.' And '.com' To Text, Techdirt, http://techdirt.com/articles/ 20080626/0203581527.shtml, Retrieved May 27, (2009)