The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities

Alison Munsch, Peter Munsch
{"title":"The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities","authors":"Alison Munsch, Peter Munsch","doi":"10.58729/1941-6679.1454","DOIUrl":null,"url":null,"abstract":"Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"256 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Technology and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58729/1941-6679.1454","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
API(应用程序编程接口)安全的未来:数字通信API的采用及其对网络安全漏洞的影响
企业和消费者需要有一个健壮的应用程序编程接口(API)管理和安全程序,以确保他们使用最新的策略来证明这些事务是足够安全的。技术供应商确实为客户提供API管理工具,并且已经建立了用于保护API事务的API安全标准。考虑到为企业对企业(B2B)和企业对消费者(B2C)通信保持API开放和易于实现的努力,安全标准必须成为API管理的一部分。这项研究收集了数据来调查api易受攻击的原因。该研究探讨了客户在为其组织开发私有API方面的不同专业经验,并将其与提供产品和服务以帮助其客户进行API开发,安全和管理的网络安全供应商/供应商部分进行了比较。研究发现,API漏洞在发生时通常不会被检测到,并且IT角色对安全准备情况的看法也不同。本研究确定了一些可以帮助任何组织改进API安全管理的基本阻塞和处理基础
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Information Technology and Management
International Journal of Information Technology and Management Computer Science-Computer Science Applications
CiteScore
1.10
自引率
0.00%
发文量
29
期刊介绍: The IJITM is a refereed and highly professional journal covering information technology, its evolution and future prospects. It addresses technological, managerial, political, economic and organisational aspects of the application of IT.
期刊最新文献
Scheduling and monitoring on engineering vehicles based on IoT Design and implementation of big data analysis and visualisation platform for the smart city A Risk Identification Method for Abnormal Accounting Data Based on Weighted Random Forest Research on evaluation method of e-commerce platform customer relationship based on decision tree algorithm Risk assessment method of power grid construction project investment based on grey relational analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1