Essays about: "Cross-site request forgery"
Showing result 1 - 5 of 6 essays containing the words Cross-site request forgery.
-
1. SQL injection attacks and countermeasures in PHP, and Cross-Site Request Forgery
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Websites have become a vital tool for any establishment's success. However, all users do not enter websites with good intentions. Two commonly seen website functionalities are a login system and the possibility for users to leave and read reviews. READ MORE
-
2. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective
University essay from Linköpings universitet/Programvara och systemAbstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE
-
3. How Secure is Verisure’s Alarm System?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. READ MORE
-
4. A Security Analysis of Wireless Smart Home Technologies
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The use of electronics connected to local networks and the Internet is growingall the time. Nowadays you can control your electronics in your house even when away from home, which opens up for potential security threats. READ MORE
-
5. Generating web applications containing XSS and CSRF vulnerabilities
University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska högskolanAbstract : Most of the people in the industrial world are using several web applications every day. Many of those web applications contain vulnerabilities that can allow attackers to steal sensitive data from the web application's users. One way to detect these vulnerabilities is to have a penetration tester examine the web application. READ MORE