Summary: The problem of security breaches of Internet technologies studied. Typical architecture of web-applications is described. Classification of threats of web-applications developed. The consequences of threats and attacks described. The authors were identified direction and protection technology. The life cycle of the process of creating and support a protected web-applications is described.
Keywords: information security, internet, statistics security threats, system protection, e-commerce, WAF, secure connection.