We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
SECURITY'S LEAKS IN SEO SPAMMING.
- Authors
Petkova, Lilyana
- Abstract
The full lack of security provides a huge omission in the application or software development life cycle. An example of security flaw is an ineffective search engine optimization (SEO). That can lead to various troubles in an already well developed or during development Internet sites. There has been a rise in SEO spam and malware which purpose is to destroy the application search indexes by adding content, which does not correspond to the idea of the application. Unusual links, pages or comments can confuse the website's visitors and drive the traffic to malicious websites. A badly secure websites are juicy target for each hacker. In some cases, the obstacle of implementing each type of security protection is just time, but the worst reason is either uninformed or unqualified developers without experience in SEO. The amount of guides and tools to help them is huge which interferes with developers' work by adding more time in investigating it! The purpose of the current research is to review SEO spams, malware, and the damages they can cause to the Internet applications! Firstly, we describe the concept and definition of SEO spams and malware. Then we are going to review different mechanisms for protecting the Internet applications of those SEO spams and malware. We provide basic information for each protection method as well as some real examples on the SEO spamming threat. In conclusion, we analyze different damages they can cause as well as different ways of finding those types of attacks by scanning some of the most common sites in Bulgaria. In the analysis, we have used the ALEXA Top 1 Million sites Insight tool. In addition to our new knowledge and skills gained during the research, we have added several more sites developed in our work and on which we have applied those skills. The concept of our entire study is to show the use of free tools in supporting developers' work progress. Therefore, we are showing some free scanners in order to confirm what we propose in this research! The need of security integration in the web applications becomes more and more necessary with the evolution of technology. Along with other security's implementations on a programming and on a server's level the ones described in the article bring another layer of security management that mitigates certain types of cyberattacks and vulnerabilities. It does not fully protect our applications but it gives an extra level of security by restricting the attackers' actions. Those attacks as well as other types of attacks prove that the security of an application must be taken apart and integrated at the beginning of the application development life cycle.
- Subjects
BULGARIA; SEARCH engine optimization; MALWARE; INTERNET security; WEBSITES
- Publication
Knowledge: International Journal, 2019, Vol 35, Issue 3, p987
- ISSN
2545-4439
- Publication type
Article