Design Foundations and Analysis

Though providing its users with a range of efficient tools and opening new opportunities for communication, digital technology has become a part and parcel of not only casual communication, but also business interactions. However, due to the dents in the security of the digital data, the necessity to upgrade security analysis consistently emerges.

At present, an array of tools is used for enhancing the security of online data. Specifically, the tool such as the Web Security Threat Classification, contributes to a major enhancement of the security rates for a certain database. The Web Application Security Statistics tool created by the Web Application Security Consortium (WASC) uses the statistical data gathered from the Internet in order to create a framework for detecting the potential threats to the security of databases by identifying the existing vulnerability classes and designing testing methodologies for locating these vulnerabilities.

The tool in question allows for both manual and automated processing of data with the following compilation of the representative statistical data. The latter, in its turn, allows for differentiating between the vulnerabilities found based on their risk level.

Vulnerabilities classification.
Picture 1. Vulnerabilities classification (WASC, 2010, para. 6).

The graph provided above shows that the methods adopted are applied successfully to detecting the key types of safety issues by splitting them into urgent, critical, high, medium and low.

The above-mentioned theory of numbers plays a huge part in enhancing online data security. Particularly, the theory in question provides the methods for designing the tools in question and carrying out the analysis of the existing threats. To be more exact, the number theory allows for carrying out the cryptographic computations, which support secure communication and eliminate the existing vulnerabilities. For instance, by creating a digital signature to a message, one is capable of verifying the integrity of the message in question, therefore, protecting one’s personal data from a possible exposure. The design of a digital signature, in its turn, is carried out with the help of the cryptographic processes (encryption/decryption).

The confidentiality issue, which is often identified as the key problem in the process of online communication, in its turn, can be resolved with the help of the RSA cryptosystem, which is also an essential concept in the number theory. Though the RSA approach itself has already been washed away by the sands of time, the principle, which it is based on, i.e., the fast Fourier transform, is still adopted in designing modern strategies for detecting threats and preventing them within online environment. To be more exact, the aforementioned approach qualifies for creating digital signatures with the help of the following formula:

Formula.

The verification of the signature, in its turn, is carried out with the help of the following formula:

Formula (Goodrich & Tamassia, 2010).

Though the effects of the WASC’s activities may not be as evident as they should, the work that has been done is still beyond impressive. As the Table 1 below shows, a total of 178764 vulnerabilities have been detected with the help of various tools for a mathematical analysis designed for detecting issues in the security system.

Table 1. Vulnerabilities Statistics (2010) (WASC, 2010, para. 11).

No. of Vulns No. of Sites % Vulns % Sites
ALL Stat (Server-Side) 50856 10125 52.13% 83.09%
ALL Stat (Client-Side) 46698 7580 47.87% 62.20%
Scans (Server-Side) 19746 8922 55.60% 85.40%
Scans (Client-Side) 15767 6607 44.40% 63.24%
BlackBox (Server-Side) 4260 804 23.77% 76.86%
BlackBox (Client-Side) 13665 747 76.23% 71.41%
WhiteBox (Server-Side) 17700 145 63.73% 96.67%
WhiteBox (Client-Side) 10072 117 36.27% 78.00%

Reference List

Goodrich, M. T. & Tamassia, R. (2010). Chapter 10. Number theory and cryptography. In Algorithm design foundations, analysis, and internet examples (pp. 453–508). New York, NY: John Wiley & Sons, Inc. Web.

WASC. (2010). Web application security statistics. Web Application Security Consortium. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2020, December 16). Design Foundations and Analysis. https://studycorgi.com/design-foundations-and-analysis/

Work Cited

"Design Foundations and Analysis." StudyCorgi, 16 Dec. 2020, studycorgi.com/design-foundations-and-analysis/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2020) 'Design Foundations and Analysis'. 16 December.

1. StudyCorgi. "Design Foundations and Analysis." December 16, 2020. https://studycorgi.com/design-foundations-and-analysis/.


Bibliography


StudyCorgi. "Design Foundations and Analysis." December 16, 2020. https://studycorgi.com/design-foundations-and-analysis/.

References

StudyCorgi. 2020. "Design Foundations and Analysis." December 16, 2020. https://studycorgi.com/design-foundations-and-analysis/.

This paper, “Design Foundations and Analysis”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.