Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/123456789/29303Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Govorova, S. V. | - |
| dc.contributor.author | Говорова, С. В. | - |
| dc.contributor.author | Ishchenko, T. | - |
| dc.contributor.author | Ищенко, Т. | - |
| dc.contributor.author | Khatsukova, A. | - |
| dc.contributor.author | Хацукова, А. | - |
| dc.contributor.author | Melnikov, S. V. | - |
| dc.contributor.author | Мельников, С. В. | - |
| dc.contributor.author | Govorov, E. Y. | - |
| dc.contributor.author | Говоров, Е. Ю. | - |
| dc.date.accessioned | 2024-12-04T11:50:18Z | - |
| dc.date.available | 2024-12-04T11:50:18Z | - |
| dc.date.issued | 2024 | - |
| dc.identifier.citation | Govorova, S., Ishchenko, T., Khatsukova, A., Melnikov, S., Govorov, E. Methods of Safe Processing of User-Entered Information in Information Systems // Lecture Notes in Networks and Systems. - 2024. - 863 LNNS. - pp. 89-96. - DOI: 10.1007/978-3-031-72171-7_9 | ru |
| dc.identifier.uri | https://dspace.ncfu.ru/handle/123456789/29303 | - |
| dc.description.abstract | The paper delves into the critical importance of information security, particularly in user input processing tools, within the contemporary. It highlights the exponential growth of data types and volumes in information systems, emphasizing the consequent rise in vulnerabilities exploited by attackers. Common attack methods like SQL injection, cross-site scripting, and buffer over-flow are discussed alongside the risks posed by inadequate user training in information security. The authors analyze the risks that arise when processing data entered by the user. Based on analysis, it is suggested to use comprehensive security measures, including validation, sanitization, and parameterized queries, to counteract these threats. Validation ensures data correctness both client-side and server-side, while sanitization removes invalid characters to prevent attacks. Parameterized queries mitigate SQL injection risks. Recommendations include regular software updates, employee training, and penetration testing to bolster security. Paper underscores the necessity of employing various protection methods to safeguard information systems comprehensively. By integrating multiple layers of defense, organizations can mitigate operational vulnerabilities, prevent unauthorized access, and maintain data integrity, thereby fostering trust among users and stakeholders in the digital realm. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Cross-site scripting | ru |
| dc.subject | User-entered information | ru |
| dc.subject | Parametrized queries | ru |
| dc.subject | SQL injection | ru |
| dc.subject | Sanitization | ru |
| dc.subject | Validation | ru |
| dc.title | Methods of Safe Processing of User-Entered Information in Information Systems | ru |
| dc.type | Статья | ru |
| vkr.inst | Институт перспективной инженерии | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 3306.pdf Restricted Access | 132.11 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.