null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
60707
Computer Security U10 - Web Security
Description
Mind Map on Computer Security U10 - Web Security, created by Nick.Bell2013 on 28/04/2013.
Mind Map by
Nick.Bell2013
, updated more than 1 year ago
More
Less
Created by
Nick.Bell2013
over 11 years ago
52
8
0
Resource summary
Computer Security U10 - Web Security
Web basics
HTTP
HTML
URL
TCP/IP protocol
stateless
unprotected
security issues
C I A
availability
Web applications
functionality
server-side
SQL Injection attack
client -side
active content
mobile code
attack = "jumping the firewall
safeguards
blocking/filtering before execution
restricting functionality
Sandboxing
code signing
digital signature
assumes fully implemented PKI
Java Virtual Machine (JVM)
trusted sources
attacks
Parameter injection
Cross-site scripting
File traversals
Authentication
SSL
SSO
local password storage
proprietary, vendor-specific solutions
centralised approach
federated approach
Library Alliance
MS Passport
Pros
no special s/ware needed
Cons
central server = single point of failure
data mining
Privacy
Web session traces
cookies
session management
personalised web offers
authentication
server logs
cached web pages
Transmission security
Secure Socket Layer (SSL) & Transport Layer Security (TLS)
security services
strong authentication
integrity
confidentiality (encryption)
stops: spoofing eavesdropping manipulation
deployment
not a single solution
security ends outside tunnel
dependent on PKI
Browser security
settings
SSL
cookies
active content
caching
passwords
complex/numerous
Web services
idea
services in machine-readable form
technology
HTTP
XML
SOAP
WSDL
UDDI
security
initiatives
add security mechanisms
web services
issues
delegation
over company borders
transaction
end-to-end
message-level
for open infrastructure
between "strangers"
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
Pythagorean Theorem Quiz
Selam H
Spanish Verbs
Niat Habtemariam
Biology: B2.1, cells and simple cell transport; B2.2, tissues, organs and organ systems
Henry Kitchen
AQA GCSE Biology B1 unit 1
Olivia Phillips
AQA GCSE Product Design Questions
Bella Statham
Arrested by Police - 1976 Bail Act (Section 3 & 4)
Mark Hughes
RESUMEN-IMPORTANCIA DE ESTRATEGIA DE COMPRENSION LECTORA EN ESTE PROCESO
Luz Adriana SUAREZ ALARCON
Browse Library