Skip to main content

12 docs tagged with "cybersecurity"

View all tags

Authentication

Authentication is crucial in cybersecurity, as we only want authorized users performing certain actions, and before authorization must come authentication.

Cryptographic Services

- To enforce security in systems, we will need to use the following Cryptographic Services:

Web Vulnerabilities

The Web has vastly expanded over the past couple of decades, and with this came the emergence of thousands of vulnerabilities, and subsequently, attacks across the Internet. But why is the Web source for so many vulnerabilities? The truth is that the Web gathers all of three factors that mainly influence vulnerabilities, which are:

Wireless Security Challenges

Wireless networks possess some additional security challenges that don't exist in traditional, because the communication can be easily is propagated through an uncontrolled environment (you can intercept all communication using a radio antenna; in wired communication is harder). The two main problems of wireless communication are:

XML Injection

XML injections are simple vulnerabilities, in which a server doesn't check for user input; this input will then be badly interpreted by the server's XML interpreter.

XSS Vulnerabilities

XSS (or Cross Site Scripting) vulnerabilities envolve running illegal code (scripts), introduced by an attacker, in the victim's browser (typically JavaScript). XSS vulnerabilities are some of the more common web app security issues (according to OWASP, Top3 vulnerability in 2013, Top7 in 2017).