Ghauri
Ghauri
Dr.P.Venkadesh Dr.S.V.Divya
Professor/AI&DS, Professor/CSE,
V.S.B College of Engineering Technical V.S.B College of Engineering Technical
Campus,Coimbatore,TN, India Campus,Coimbatore,TN. India
[email protected] [email protected]
threats and the critical importance of maintaining robust Cost High due to labor-intensive Lower long-term costs,
cybersecurity practices.[5] processes efficient resource use [11]
Install Requirements
References
[1] McGraw, G. “Software Security: Building Security”, In.
Addison-Wesley Professional, 2006.
[2] Halfond, W. G., Viegas, J., & Orso, A., “A classification
of SQL-injection attacks and countermeasures”, Proceedings
of the IEEE International Symposium on Secure Software
Engineering, 2006.
[3] Rahman, M. M., & Gupta, B. B, “A Comprehensive
Survey on Cross-Site Scripting (XSS) Attacks”, In 2023 11th
International Conference on Software Security and Reliability
(ICSSR),pp. 121-127 .
DOI: https://dx.doi.org/10.2139/ssrn.3564967
[4] Verizon, “Data Breach Investigations Report”.
https://www.verizon.com/business/resources/reports/dbir/
[5] IBM Security. (2022). Cost of a Data Breach Report.
https://www.ibm.com/security/data-breach
[6] Ponemon Institute. (2021). The Impact of Data Breaches
on Reputation & Share Value.
https://www.centrify.com/resources/ponemon-impact-of-data-
breaches/
[7] McGraw, G. (2004). Software Security: Building Security
In. Addison-Wesley Professional.
[8] OWASP Foundation. (2020). OWASP Testing Guide.
https://owasp.org/www-project-
testing/OWASP_Testing_Guide_v4.pdf
[9] Viega, J., & McGraw, G. (2001). Building Secure
Software: How to Avoid Security Problems the Right Way.
Addison-Wesley Professional.