Chapter 4
Chapter 4
NIRMALA
UNIT 4:
5. Traffic spikes
which is why an issue with these systems can result in a plethora of issues.
Without the proper protection, faulty DNS queries can prevent visitors from
reaching your website, while also causing errors, 404s, and incorrect pathways.
Dr.G.NIRMALA
If your servers are particularly slow, they could be hosted using a shared account, which means
that your site is sharing the server with hundreds, possibly thousands of other websites. You can
address this common roadblock by checking with your hosting company to determine whether or
not the site is hosted on a dedicated server. If it isn’t, you can request this service, but it may
Another web application performance problem that many face is with poorly written code, which
could refer to inefficient code, memory leaks, or synchronization issues. Your application could
also deadlock due to ineffectual algorithms, as well as the performance degradation of a web
Dr.G.NIRMALA
application. Old versions of software or integrated legacy systems can also take a toll on your
website’s performance.
Slow response times can also be caused by poor load distribution. When new site visitors are
assigned incorrectly, it can drown out your servers even if the system is under capacity. Such an
issue can cause a slow response time, especially if your site is receiving too many requests.
5) Traffic spikes
Spikes happen, especially during a marketing promotion with videos, and a company may not be
prepared for the extra traffic. This issue can also cause your servers to slow down, hindering the
Even the name of your website can affect its performance as HTML title tags are essential to its
success. These tags sum up the entire content of your website or web page to major search
engines such as Google. However, a lack of specificity in your domain name can lower its
visibility.
When developing and testing a site, businesses often rely on a local network environment. This
may not seem like an issue at first because adding visual, audio, video or other high-volume data
XSS:
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are
XSS attacks occur when an attacker uses a web application to send malicious code,
Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web
application uses input from a user within the output it generates without validating or
encoding it.
The end user’s browser has no way to know that the script should not be trusted, and will
Because it thinks the script came from a trusted source, the malicious script can access
any cookies, session tokens, or other sensitive information retained by the browser and
These scripts can even rewrite the content of the HTML page
● Server XSS
● Client XSS
Dr.G.NIRMALA
Server XSS
Server XSS occurs when untrusted user supplied data is included in an HTML response
generated by the server. The source of this data could be from the request, or from a stored
location. As such, you can have both Reflected Server XSS and Stored Server XSS.
Client XSS
Client XSS occurs when untrusted user supplied data is used to update the DOM with an unsafe
JavaScript call. A JavaScript call is considered unsafe if it can be used to introduce valid
JavaScript into the DOM. This source of this data could be from the DOM, or it could have been
sent by the server (via an AJAX call, or a page load). The ultimate source of the data could have
been from a request, or from a stored location on the client or the server. As such, you can have
SQL Injection:
SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL
code for backend database manipulation to access information that was not intended to be
displayed. This information may include any number of items, including sensitive
The impact SQL injection can have on a business is far reaching. A successful attack may
result in the unauthorized viewing of user lists, the deletion of entire tables and, in certain
cases, the attacker gaining administrative rights to a database, all of which are highly
detrimental to a business.
Dr.G.NIRMALA
When calculating the potential cost of a SQLI, it’s important to consider the loss of
customer trust should personal information such as phone numbers, addresses and credit
CRSF:
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute
CSRF attacks specifically target state-changing requests, not theft of data, since the
With a little help of social engineering (such as sending a link via email or chat), an
attacker may trick the users of a web application into executing actions of the attacker's
choosing.
If the victim is a normal user, a successful CSRF attack can force the user to perform
state changing requests like transferring funds, changing their email address, and so forth.
If the victim is an administrative account, CSRF can compromise the entire web
application.
PASSWORD VULNERABILITES:
Measures mitigating one of these vulnerabilities can increase exposure to another. For example,
strong passwords can be difficult to remember and this may lead to their being forgotten or
● Organizational or user vulnerabilities: This includes lack of password policies that are
enforced within the organization and lack of security awareness on the part of users.
● Technical vulnerabilities: This includes weak encryption methods and unsecure storage
SSL:
Secure Sockets Layer (SSL) is a computer networking protocol for securing connections
between network application clients and servers over an insecure network, such as the
internet. Due to numerous protocol and implementation flaws and vulnerabilities, SSL
was deprecated for use on the internet by the Internet Engineering Task Force (IETF) in
2015 and has been replaced by the Transport Layer Security (TLS) protocol.
SSL uses a combination of public key and symmetric key encryption to secure a connection
between two machines, typically a web or mail server and a client system, communicating
over the internet or another TCP/IP network. SSL provides a mechanism for encrypting
How it works
The SSL protocol includes two sub protocols: the record protocol and the "handshake"
protocol.
The handshake protocol defines how a client and server establish an SSL connection,
including the negotiation of which cryptographic systems each host is willing (or unwilling)
Dr.G.NIRMALA
to use for communication, as well as the exchange of cryptographic material, such as public
The record protocol defines how communicating hosts exchange data using SSL, including
specifications for how data is to be prepared for transmission and how it is to be verified or
decrypted on receipt
CAPTCHA:
Completely automated public Turing test to tell computers and humans apart, better known
test to a machine.
session by surreptitiously obtaining the session ID and masquerading as the authorized user.
Once the user's session ID has been accessed (through session prediction), the attacker can
masquerade as that user and do anything the user is authorized to do on the network.
Session hijacking takes advantage of that practice by intruding in real time, during a session.
The intrusion may or may not be detectable, depending on the user's level of technical
If a Web site does not respond in the normal or expected way to user input or stops responding
AUDIT TRAIL:
A record showing who has accessed a computer system and what operations he or she has
performed during a given period of time. Audit trails are useful both for maintaining security and
for recovering lost transactions. Most accounting systems and database management
systems include an audit trail component. In addition, there are separate audit
trail software products that enable network administrators to monitor use of network resources.
Local File inclusion (LFI), or simply File Inclusion, refers to an inclusion attack through which
an attacker can trick the web application in including files on the web server by exploiting
functionality that dynamically includes local files or scripts. The consequence of a successful
LFI attack includes Directory Traversal and Information Disclosure as well as Remote Code
Execution.
Dr.G.NIRMALA
Typically, Local File Inclusion (LFI) occurs, when an application gets the path to the file that has
to be included as an input without treating it as untrusted input. This would allow a local file to
Local File Inclusion is very much like Remote File Inclusion (RFI), with the difference that with
Local File Inclusion, an attacker can only include local files (not remote files like in the case of
RFI).
Remote File inclusion (RFI) refers to an inclusion attack wherein an attacker can cause the web
application to include a remote file by exploiting a web application that dynamically includes
external files or scripts. The consequences of a successful RFI attack include Information
Remote File Inclusion (RFI) usually occurs, when an application receives the path to the file that
has to be included as an input without properly sanitizing it. This would allow an external URL
One of the most effective ways to prevent common server problems is to entrust the running of
your web services to a respected managed host. When trouble strikes and a server goes down, a
managed hosting provider knows just how to get things back on track. Often, they can head off
the problem before it takes effect – leaving your web service users none the wiser
Dr.G.NIRMALA
Over half of visitors say they will abandon a web page loading if its time exceeds three seconds.
This may seem excessive, but with faster web speeds and better access, consumers are more
demanding than ever before. Lots of things can contribute to slow page loading, including image
rendering, complicated forms, videos that autoplay and site usage at the time of visiting.
Sometimes it may just be that the client’s web browser is to blame! However, the problem often
lies with the website being accessed. If your web service is running slowly, you could start to see
Security is a concern for every business; you need to keep yourself, your company, your
employees and your clients safe at all times. Online services can carry some risk, especially
when dealing with personal details or payment information. Netcraft’s recent web server
survey highlighted that cyber attacks on data centers are still common – these varied attacksaim
The primary goal of almost every website, online profile, and all associated web services is to
generate leads. An increase in traffic is therefore usually a positive thing, signaling that one of
your marketing campaigns is working well and that your brand is being well received. However,
when high traffic to a website is sudden and unexpected, this can cause issues with functionality.
Dr.G.NIRMALA
Too much traffic can cause pages to load slowly, features on the site to stop working, and, in
A study by Storage craft found that 99% of surveyed respondents had experienced a hardware
failure, and 71% of IT professionals have worked with clients who went through data loss or
disaster. At some point, every business is likely to experience problems with their hardware.
Having a team you can rely on means that when disaster does strike or when an issue starts to
The biggest problem that can affect a server is a total crash. A physical problem such as a fire or
flood might cause you to completely lose your server. A cyber attack may cause your server to
shut down completely. Hardware and software failures can also lead to a full shutdown. Or, even
worse than suffering through slow server performance, your web service could become entirely
unavailable – and without a proper backup, you could be out of action for quite some time.