16
Online Book store Course Name: Web Security Project 1 Presented by Amruta Raichurkar Videhi Patel

Online Book store

Embed Size (px)

DESCRIPTION

Online Book store. Course Name: Web Security Project 1 Presented by Amruta Raichurkar Videhi Patel. Overview. Design Workflow Potential vulnerabilities. Design. 3 tier structure UML sequence diagram. Workflow. As user As administrator. Login. Registration. Home. - PowerPoint PPT Presentation

Citation preview

Page 1: Online Book store

Online Book store

Course Name: Web Security Project 1

Presented by

Amruta RaichurkarVidehi Patel

Page 2: Online Book store

Overview

Design Workflow Potential vulnerabilities

Page 3: Online Book store

Design

3 tier structure UML sequence diagram

Page 4: Online Book store

Workflow

As user As administrator

Page 5: Online Book store

Login

Page 6: Online Book store

Registration

Page 7: Online Book store

Home

Page 8: Online Book store

Book Description

Page 9: Online Book store

Cart

Page 10: Online Book store

Edit Book Information

Page 11: Online Book store

Database

Tables- Members- Categories- Items- Orders

- Card Types

Page 12: Online Book store

Potential Vulnerabilities

Cross Site scripting(XSS)Act of writing malicious scripting code and tricking another

users web Browser into running it using third party’s web server. It

attempts to steal a cookie value of user’session and use it to log into the

website.

<b>foo</b><script language =‘javascript’>

alert(document.cookie)</script>

Page 13: Online Book store

Potential Vulnerabilities Impersonating user or system Malicious user acts as a legal receiver for the packet and

steals it. The destined receiver does not get a copy of this packets.

Sender Receiver

Cracker

Packet #1“abcde”

Page 14: Online Book store

Tools

J2SE 1.4.2 Tomcat 4.1 Mysql 4.1

Page 15: Online Book store

References

Java – How to Program-Deitel & Deitel

Web Development with Java Server Pages

-Duane K. Fields, Mark A. Kolb

www.java.sun.com

Page 16: Online Book store

Thank You