null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
60707
Computer Security U10 - Web Security
Description
Mind Map on Computer Security U10 - Web Security, created by Nick.Bell2013 on 28/04/2013.
Mind Map by
Nick.Bell2013
, updated more than 1 year ago
More
Less
Created by
Nick.Bell2013
over 11 years ago
52
8
0
Resource summary
Computer Security U10 - Web Security
Web basics
HTTP
HTML
URL
TCP/IP protocol
stateless
unprotected
security issues
C I A
availability
Web applications
functionality
server-side
SQL Injection attack
client -side
active content
mobile code
attack = "jumping the firewall
safeguards
blocking/filtering before execution
restricting functionality
Sandboxing
code signing
digital signature
assumes fully implemented PKI
Java Virtual Machine (JVM)
trusted sources
attacks
Parameter injection
Cross-site scripting
File traversals
Authentication
SSL
SSO
local password storage
proprietary, vendor-specific solutions
centralised approach
federated approach
Library Alliance
MS Passport
Pros
no special s/ware needed
Cons
central server = single point of failure
data mining
Privacy
Web session traces
cookies
session management
personalised web offers
authentication
server logs
cached web pages
Transmission security
Secure Socket Layer (SSL) & Transport Layer Security (TLS)
security services
strong authentication
integrity
confidentiality (encryption)
stops: spoofing eavesdropping manipulation
deployment
not a single solution
security ends outside tunnel
dependent on PKI
Browser security
settings
SSL
cookies
active content
caching
passwords
complex/numerous
Web services
idea
services in machine-readable form
technology
HTTP
XML
SOAP
WSDL
UDDI
security
initiatives
add security mechanisms
web services
issues
delegation
over company borders
transaction
end-to-end
message-level
for open infrastructure
between "strangers"
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
2014 GCSE History Exam Paper Setup
James McConnell
AS Unit 1 Physics Flashcard Deck
Callum McClintock
Biology
Holly Bamford
Conferences of the Cold War
Alina A
chemsitry as level topic 5 moles and equations
Talya Hambling
Spelling, punctuation and grammar in English
Sarah Holmes
Types of Learning Environment
Brandon Tuyuc
Specifc Topic 7.4 Timber (Impacts)
T Andrews
Browse Library