In the last decade, millions of people have used the Web to communicate and conduct business with their customers. This includes web applications that store and collect data. This includes information about customers provided through content management systems, online shopping carts, inquiry forms, or login fields.

These applications are often accessed via the Internet and can be hacked to exploit vulnerabilities within the application or supporting infrastructure. For instance, SQL injection attacks (which exploit weaknesses in the database) could result in compromised databases that hold sensitive information. Attackers can also exploit an advantage gained by breaching a Web application to find and access other vulnerable systems on your network.

Other commonly used Web attacks include Cross Site Scripting attacks (XSS) that exploit weaknesses in the web server to inject malicious code into web pages, which executes as a virus-infected script within the victim’s browser. This allows attackers to access sensitive information or send users to phishing sites. XSS attacks are most common on blogs, message boards and web forums.

Hackers band together to overwhelm a website by sending more requests than the site can handle. This can cause the page to lag or even shut down completely and impede its ability to process requests, rendering it unusable for everyone. DDoS attacks can be devastating for small businesses like local bakeries or restaurants that depend on their websites to run.