Time is nearing for the standalone applications as world is moving more and more towards web. We already saw major changes in the way we use applications, For example Emails, maps, news, Docs, weather, storage and many more complex applications too. Everything which was earlier used as a standalone application or supporting application is now moving completely independent (not completely still depends on internet :P) .

Let us think our daily routines, Without internet is your mobile phone useful, mostly it’s nah..! .  Even though mobiles serves it’s purpose of making and answering calls. Because all our mobiles have crossed the basic functionality long back. Our mobile phones are useless without the Internet since nearly all mobile applications connect to the cloud, storing our pictures, usernames and passwords and private information. Even our home devices are now connecting to the Web, with IOT (Internet of Things).

We see that the information about personal submitted in the web is increasing day by day. This results in so many issues that we are aware when compromised. Since the Application layer is very hard layer to defend.

There are numerous Attacks and they can be categorized as 12 Categories.

  • Abuse of Functionality‎
  • Data Structure Attacks‎
  • Embedded Malicious Code‎
  • Exploitation of Authentication‎
  • Injection‎
  • Path Traversal Attack‎
  • Probabilistic Techniques
  • Protocol Manipulation‎
  • Resource Depletion‎
  • Resource Manipulation‎
  • Sniffing Attacks‎
  • Spoofing

We will be seeing most common attacks one by one in brief on What it is and How to secure from it in the next post.

Data at risk
Data at risk