
Farooq Ahmad
Related Authors
Richard Bush
Baker College
Haitham El-Ghareeb
Mansoura University
Arthur Tatnall
Victoria University
Noel Carroll
University of Galway
Louis de Saussure
University of Neuchâtel
Stephen Yablo
Massachusetts Institute of Technology (MIT)
Eitan Grossman
The Hebrew University of Jerusalem
Mahyuddin K. M. Nasution
Universitas Sumatera Utara
carlotta pavese
Cornell University
Friederike Moltmann
Centre National de la Recherche Scientifique / French National Centre for Scientific Research
Interests
Uploads
Papers by Farooq Ahmad
banking transactions, shopping, services and advertisement. With the exponentially increase in usage of cyberspace, cybercriminal actives are also increase exponentially. The basic reasons is that with the inception of world wide web, the web applications were also getting popularity for data storing and data sharing, irrespective of the user. With the passage of time web applications were getting more complex with rapid increase in their design faults, creating the surfing of internet totally unsafe. More than 90 percent web applications have some kind of design or development fault which can be easily exploited by the cyber criminals. These faults in web application can help criminals in getting the illegal access to trade secrets of any business. Sometime the web application may not be posing threat but the technology used in these applications become the root cause and put the application to the risk of illegal access. Presently the social networks, Internet connected mobile devices, individual privacy, and the online connectivity of entities such as banks are the most enticing targets for cyber criminals. In this survey we highlight the common cyber threats and detailed analysis of existing system and methodology used for its industrial solutions. Some important some industrial application also analyzed this
paper.
banking transactions, shopping, services and advertisement. With the exponentially increase in usage of cyberspace, cybercriminal actives are also increase exponentially. The basic reasons is that with the inception of world wide web, the web applications were also getting popularity for data storing and data sharing, irrespective of the user. With the passage of time web applications were getting more complex with rapid increase in their design faults, creating the surfing of internet totally unsafe. More than 90 percent web applications have some kind of design or development fault which can be easily exploited by the cyber criminals. These faults in web application can help criminals in getting the illegal access to trade secrets of any business. Sometime the web application may not be posing threat but the technology used in these applications become the root cause and put the application to the risk of illegal access. Presently the social networks, Internet connected mobile devices, individual privacy, and the online connectivity of entities such as banks are the most enticing targets for cyber criminals. In this survey we highlight the common cyber threats and detailed analysis of existing system and methodology used for its industrial solutions. Some important some industrial application also analyzed this
paper.