10 Most Common Web Security Vulnerabilities OWASP or Open Web Security Project is a non-profit charitable organization focused on improving the security of software and web applications. The organization publishes a list of top web security vulnerabilities based on the data from various security organizations. The web security vulnerabilities are prioritized depending on exploitability, detectability and impact on software. Exploitability – What is needed to exploit the security vulnerability? Highest exploitability when the attack needs only web browser and lowest being advanced programming and tools. Detectability – How easy is it to detect the threat? Highest being the information displayed on URL, Form or Error message and lowest being source code. Impact or Damage – How much damage will be done if the security vulnerability is exposed or attacked? Highest being complete system crash and lowest being nothing at all. The main aim of OWASP Top 10 is to ed...
Popular posts from this blog
Dos attack
DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS What is DoS Attack? DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. DoS is the acronym for D enial o f S ervice. This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This results in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down. Cutting off some business from the internet can lead to significant loss of business or money. The internet and computer networks power a lot of businesses. Some organizations such as payment gateways, e-commerce sites entirely depend on the internet to do business. In this tutorial, we will introduce you to what denial of service attack is, how it is performed and how you can protect against such attacks. ...
Cryptography
Cryptography Tutorial: Cryptanalysis, RC4, CrypTool Information plays a vital role in the running of business, organizations, military operations, etc. Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information . Cryptology involves transforming information into the Nonhuman readable format and vice versa. In this article, we will introduce you to the world of cryptology and how you can secure information from falling into the wrong hands. Topics covered in this tutorial What is cryptography? What is cryptanalysis? What is cryptology? Encryption Algorithms Hacking Activity: Hack Now! What is Cryptography? Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa. Let’s illustrate this with the aid of an example. Suppose you want to send the message...
Comments
Post a Comment