Cookie Control

This site uses cookies to store information on your computer.

Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links.

We also use some non-essential cookies to anonymously track visitors or enhance your experience of the site. If you're not happy with this, we won't set these cookies but some nice features of the site may be unavailable.

(One cookie will be set to store your preference)
(Ticking this sets a cookie to hide this popup if you then hit close. This will not store any personal information)

About this tool

About Cookie Control

         

Whitehouse

Projecting & Securing Web2.0: CMS Security

Fri, 09/04/2015 - 10:26 -- pottol

0         CMS Security

Security should have to be seriously considered in CMS development.

0.1        Security Threats

0.1.1        Is the Web 2.0 insecure by design?

The most part of exploits come from Web 2.0 components. Infrastructural ones are residual (according to [21]).

 

 

 

Usual Example of cyber attacks:

·         Web: SQLi, Defacement, iFrame, Account Hijack, XSS

·         Infr: DNS Hijacking, Application, Malware, Ramsonware, Botnet, 0-Day

Subscribe to RSS - Whitehouse