Research Article
The Application of Web-Based Scientific Computing System in Innovation and Entrepreneurship
Table 1
Web application security risks.
| Risk name | Difficulty of attack | Vulnerability universality | Difficulty of detection | Technology impact |
| Injection | 3 | 2 | 3 | 3 | Invalid authentica | 3 | 2 | 2 | 3 | Leakage of sensitive data | 2 | 3 | 2 | 3 | XML external entities | 2 | 2 | 3 | 3 | Invalid access control | 3 | 2 | 2 | 2 | Security configuration error | 2 | 3 | 3 | 3 | Cross-site scripting | 2 | 3 | 3 | 2 | Unsafe deserialization | 3 | 3 | 2 | 3 | Use components with known vulnerabilities | 3 | 3 | 2 | 2 | Insufficient logging and monitoring | 3 | 3 | 1 | 2 |
|
|