Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{178849, author = {Sahil Ahmad Lone and Wajahat Gh Mohd.}, title = {Security Challenges in Full Stack Development}, journal = {International Journal of Innovative Research in Technology}, year = {2025}, volume = {11}, number = {12}, pages = {4242-4246}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=178849}, abstract = {Full stack development involves managing both the frontend (client-side) and backend (server-side) components of web applications. While it enables rapid development and greater flexibility, it also introduces complex security challenges across multiple layers of technology. This paper takes a close look at the common security threats and vulnerabilities in Java-based full stack development, using real-world case studies to bring the issues to life. It covers key areas like front-end and back-end attack vectors, misconfigurations, insecure APIs, and weak authentication and authorization practices. By examining actual incidents and project experiences, the study offers a clear view of where security failures typically happen and how they can be prevented. It highlights best practices, secure coding techniques, and modern DevSecOps approaches to help developers and architects build stronger, more secure applications}, keywords = {stack development, security challenges, coding, backend}, month = {May}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry