Initial idea 1


Secure Scripting and Business Applications



The term "application security," or "appsec," refers to the activity of securing computer applications against outside attacks by employing various forms of security technology, including software, hardware, methodologies, best practises, and procedures. In the past, security was often overlooked during the development of new programmes. Security is becoming more and more of a top priority throughout the whole application lifecycle, from initial concept to final release. There has been a dramatic increase in the number of networked apps that have been created, disseminated, utilised, and patched. As a result, there is a growing number of dangers that must be factored into application security procedures. What is the process of protecting an application? Among the methods used to ensure security is the implementation of better security practises throughout each stage of the software development lifecycle and the whole application lifetime. Application security measures should be taken with the goal of preventing unwanted access to infrastructure, software, and information. Application security's end aim is protecting private information from being seen, altered, or erased by unauthorised parties. Security controls are any measures implemented to protect an application against unauthorised use. When it comes to protecting data, the National Institute of Standards and Technology (NIST) defines a security control as "a safeguard or countermeasure prescribed for an information system or an organisation to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements." One popular software defence is a firewall designed to protect certain applications. Based on the installed software, firewalls run files and process data in various ways. In terms of hardware, routers are the most popular countermeasure. They make it so that an individual's computer's Internet Protocol (IP) address cannot be seen by other computers on the network.





references: 

TechTarget (2020). Secure Scripting and Business Applications. Available at: www.techtarget.com (Accessed 2/12/ 2022).









Comments