Software Hacking, Protection and Testing

2017 
Hacking is the use of technology for the purposes other then what it is meant for. Many hacking techniques are used in this era to harm the software users. Hackers use different hacking techniques. In this paper we explain four different hacking techniques used by hackers like SQL injection, Phishing, Cross Site Scripting and Brute Force attacks then we also describe different ways of defense against these types of attacks. Finally we show that how we can test the software to ensure its security from these types of attacks. Our research purpose is to ensure the software protection through testing. So we collected data from the all previous researches done on relevant topics. We studied 15 above different research papers for this purpose. We also used internet (websites) for collection purpose. And then we gathered all data and presented the Hacking Techniques, Protection against Hacking and Testing of Software. In this paper we discuss how we can protect our software from these types of attacks. As we know that Hacking is well known cybercrime [16]. Everyone is aware of this. In this modern era security of software is really important. We will discuss different techniques to protect our software from different hacking techniques. Different protection methods are used for different attacks: SQL Injection Protection Methods: Predefined choices for user input, Blind Variables, Parameterized Statements, and Input Validations. Brute Force Protection Methods: Account Lockout, Progressive Delays, CAPTCHS, Strong Password. Testing of website is performed with intention of finding weakness of websites against hacking attacks and to ensure that whether data of website and its resources are protected from unauthorized access or not .Thus testing is beneficial and crucial to avoid Expenditures related to web application security against future attacks. Website downtime and money and time loss in recovering from damage. Loss of customer trust Legal implications and expenditures for having loose security measures in place. Hacking is the common known cybercrime. Developers are doing much work in this area to save computers or software from these crimes. It’s a challenge for developers because they have to deal with every type of attack. This paper describes four major types of hacking. How these hacking techniques can harm the system. Different protection measures against these hacking techniques. And this paper ensures the protection by testing so there will be no room for attacker to harm computer or personal data. This paper describes that how we can test our software to check whether it is safe from every type of attack or not.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []