Blog

Create by: pottol 05/26/2015 - 13:46 | 1 Comments
Drupal XSS Approach

A3 XSS (Cross Site Scripting)

XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

Create by: pottol 05/26/2015 - 13:42 | 1 Comments
OWASP-TopTen2013

The solution: use Drupal and secure it.

a) Drupal vs OWASP Top Ten

 

https://d25m59h0ya0u4t.cloudfront.net/pub/uploadedImages/7554676OWASP.Top10.jpg

 

vulnerabilities and threats. CMS Security should be addressed.

 

Create by: pottol 05/26/2015 - 13:39 | 1 Comments
CMS Utilization

CMS Solutions

According to [1], the top three used product are: WordPress, Joomla! and Drupal. Everyone of these has proper pros and cons. The following graph depicts CMS usage during 2014, according to WebcomWebsites (http://www.webcomwebsites.co.uk/our-articles/ ):

 

Create by: pottol 05/26/2015 - 13:35 | 1 Comments
CMS Logical Schema

The term “Web 2.0”refers to evolved web techniques such as provide a better interaction between user and site.

This should be performed by the means of a CMS (Content Management System). It allows for websites based

on contents/comments paradigm.

 

Web 2.0 Architecture

The CMS is an infrastructural layer, offering the following advantages:

· Interface: the user choose the information (text, images, videos) to display, interacting with the website,

according to specific actions (e.g. click, sting insertion).

Pages