StudyCorgi Tech & Engineering

Design Foundations and Analysis

Though providing its users with a range of efficient tools and opening new opportunities for communication, digital technology has become a part and parcel of not only casual communication, but also business interactions. However, due to the dents in the security of the digital data, the necessity to upgrade security analysis consistently emerges.

We will write a
custom essay
specifically for you

for only $16.05 $11/page
308 certified writers online
Learn More

At present, an array of tools is used for enhancing the security of online data. Specifically, the tool such as the Web Security Threat Classification, contributes to a major enhancement of the security rates for a certain database. The Web Application Security Statistics tool created by the Web Application Security Consortium (WASC) uses the statistical data gathered from the Internet in order to create a framework for detecting the potential threats to the security of databases by identifying the existing vulnerability classes and designing testing methodologies for locating these vulnerabilities.

The tool in question allows for both manual and automated processing of data with the following compilation of the representative statistical data. The latter, in its turn, allows for differentiating between the vulnerabilities found based on their risk level.

Vulnerabilities classification.
Picture 1. Vulnerabilities classification (WASC, 2010, para. 6).

The graph provided above shows that the methods adopted are applied successfully to detecting the key types of safety issues by splitting them into urgent, critical, high, medium and low.

The above-mentioned theory of numbers plays a huge part in enhancing online data security. Particularly, the theory in question provides the methods for designing the tools in question and carrying out the analysis of the existing threats. To be more exact, the number theory allows for carrying out the cryptographic computations, which support secure communication and eliminate the existing vulnerabilities. For instance, by creating a digital signature to a message, one is capable of verifying the integrity of the message in question, therefore, protecting one’s personal data from a possible exposure. The design of a digital signature, in its turn, is carried out with the help of the cryptographic processes (encryption/decryption).

The confidentiality issue, which is often identified as the key problem in the process of online communication, in its turn, can be resolved with the help of the RSA cryptosystem, which is also an essential concept in the number theory. Though the RSA approach itself has already been washed away by the sands of time, the principle, which it is based on, i.e., the fast Fourier transform, is still adopted in designing modern strategies for detecting threats and preventing them within online environment. To be more exact, the aforementioned approach qualifies for creating digital signatures with the help of the following formula:


The verification of the signature, in its turn, is carried out with the help of the following formula:

Get your
100% original paper
on any topic

done in as little as
3 hours
Learn More
Formula (Goodrich & Tamassia, 2010).

Though the effects of the WASC’s activities may not be as evident as they should, the work that has been done is still beyond impressive. As the Table 1 below shows, a total of 178764 vulnerabilities have been detected with the help of various tools for a mathematical analysis designed for detecting issues in the security system.

Table 1. Vulnerabilities Statistics (2010) (WASC, 2010, para. 11).

No. of Vulns No. of Sites % Vulns % Sites
ALL Stat (Server-Side) 50856 10125 52.13% 83.09%
ALL Stat (Client-Side) 46698 7580 47.87% 62.20%
Scans (Server-Side) 19746 8922 55.60% 85.40%
Scans (Client-Side) 15767 6607 44.40% 63.24%
BlackBox (Server-Side) 4260 804 23.77% 76.86%
BlackBox (Client-Side) 13665 747 76.23% 71.41%
WhiteBox (Server-Side) 17700 145 63.73% 96.67%
WhiteBox (Client-Side) 10072 117 36.27% 78.00%

Reference List

Goodrich, M. T. & Tamassia, R. (2010). Chapter 10. Number theory and cryptography. In Algorithm design foundations, analysis, and internet examples (pp. 453–508). New York, NY: John Wiley & Sons, Inc. Web.

WASC. (2010). Web application security statistics. Web Application Security Consortium. Web.

Print Сite this

Cite this paper

Select style


StudyCorgi. (2020, December 16). Design Foundations and Analysis. Retrieved from

Work Cited

"Design Foundations and Analysis." StudyCorgi, 16 Dec. 2020,

1. StudyCorgi. "Design Foundations and Analysis." December 16, 2020.


StudyCorgi. "Design Foundations and Analysis." December 16, 2020.


StudyCorgi. 2020. "Design Foundations and Analysis." December 16, 2020.


StudyCorgi. (2020) 'Design Foundations and Analysis'. 16 December.

Copy to clipboard

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyCorgi, request the removal.

Psst... Stuck with your
assignment? 😱
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment 📝 do you need?
How many pages (words) do you need? Let's see if we can help you!