Abstract
The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to compromise the application and the entire application environment. The areas that can be compromised include user and system administration accounts.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Ron Lepofsky
About this chapter
Cite this chapter
Lepofsky, R. (2014). Web Application Vulnerabilities and the Damage They Can Cause. In: The Manager’s Guide to Web Application Security:. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0148-0_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-0148-0_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-0149-7
Online ISBN: 978-1-4842-0148-0
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)