Monday, December 30, 2019

Unitec Advanced Cyber Security - 2412 Words

Unitec Advanced Cyber Security Research Project Table of Contents Introduction to Cross Site Scripting 1 Types of Cross Site Scripting 3 Non-Persistent 3 DOM Based Vulnerabilities 3 Defending against DOM XXS Attacks and SQL injection 4 SQL Injection 4 Acunetix Web Vulnerability Scanner 8 5 Most Recent Cyber Attacks 6 Hacking 6 Reference 7 Introduction In this generation security is one the main concern for businesses today. Methodology Introduction to Cross Site Scripting Cross Site Scripting is one of the most common web exploited vulnerability as it is listed as number 2 just after SQL injection on the OWASP website. It is also a type of injection but script injection. XSS enables the attackers to inject client-side script into web pages which are viewed by other users. Cross Site Scripting has been in World Wide Web since 1996. The attacker just needs to know a little java scripting to exploit vulnerability. Today all popular web programming technologies such as PHP, microsoft.Net, ColdFusion and asp are all acceptable with XSS. Cross Site Scripting happens when users find that your website is vulnerable and users the website to distribute malicious scripts to other users which runs in other users web browsers. This type of attack is used to steal sensitive user information such as emails, date of birth, names and hijack user sessions by which the hacker gets unauthorized access to the web server. A web application is sent with aShow MoreRelatedCyb ercrime And Its Effects On The Internet And Digital Technology Services1854 Words   |  8 Pagesone of today s most criminal acts , it is a different kind of crime where there can be no physical contact involved. Criminals now can be sitting behind a computer , on the other side of the world stealing precious information from you. Common cyber attacks can involve stealing of intellectual property, gaining confidential information, fraud by accessing personal information and overall a malicious threat in order to produce a financial or political benefit. Cybercrime today is now a bigger

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.