Web Application Vulnerabilities and the Damage They Can Cause

  • Ron Lepofsky


The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to compromise the application and the entire application environment. The areas that can be compromised include user and system administration accounts.


Risk Level Transmission Control Protocol Malicious Code Malicious User Internet Protocol Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Ron Lepofsky 2014

Authors and Affiliations

  • Ron Lepofsky
    • 1
  1. 1.OntarioCanada

Personalised recommendations