Skip to main navigation Skip to search Skip to main content

Analytical analysis of cyber threats and defense mechanisms for web application security

  • Bashaer Almelehy
  • , Mohammad Ahmad
  • , Ghalia Nassreddine
  • , Mohammed Maayah
  • , Aparna Achanta
  • King Faisal University
  • Rafik Hariri University
  • INTI International University
  • IBM

Research output: Contribution to journalArticlepeer-review

19 Citations (Scopus)
1 Downloads (Pure)

Abstract

The use of internet technologies offers numerous advantages and has significantly transformed our daily lives, becoming a primary means of communication. Additionally, many businesses have shifted their services to digital platforms by leveraging web application technologies. As a result, vast amounts of data are exchanged between users and web applications—much of which contains sensitive and critical information. This makes them prime targets for cyber-attacks, including data theft and the unauthorized disclosure of confidential information. According to the Open Web Application Security Project (OWASP), there are ten major risks that pose significant threats to web applications. In response, this paper aims to provide a thorough understanding of web applications, the potential cyber threats they face, and a detailed review of existing literature related to cybersecurity risks in web applications. To achieve this, a comprehensive literature review will be conducted to identify the primary vulnerabilities in web applications and explore current methods for mitigating and preventing these security threats.

Original languageEnglish
Pages (from-to)57-76
Number of pages20
JournalJournal of Cyber Security and Risk Auditing
Volume2025
Issue number3
DOIs
Publication statusPublished - 2 Jul 2025

Keywords

  • Open Web Application Security Project (OWASP)
  • Security threats
  • Web Applications Cyber-Attacks

ASJC Scopus subject areas

  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Analytical analysis of cyber threats and defense mechanisms for web application security'. Together they form a unique fingerprint.

Cite this