Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Jeremiah Grossman"'
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It
Autor:
Jeremiah Grossman
Publikováno v:
Communications of the ACM. 56:68-72
Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.
Publikováno v:
Queue. 10:30-38
It seems every day we learn of some new security breach. It’s all there for the taking on the Internet: more and more sensitive data every second. As for privacy, we Facebook, we Google, we bank online, we shop online, we invest online& we put it a
Autor:
Jeremiah Grossman
Publikováno v:
Queue. 10:10-15
The Internet was designed to deliver information, but few people envisioned the vast amounts of information that would be involved or the personal nature of that information. Similarly, few could have foreseen the potential flaws in the design of the
Autor:
Jeremiah Grossman
Publikováno v:
IEEE Security & Privacy. 10:91-93
This installment examines the state of website security, by the numbers. It also discusses the most effective way for organizations to achieve sustainable improvements in the security of the code they put on the Web.
Publikováno v:
SSRN Electronic Journal.
This paper examines various aspects of the FATF Recommendations and other relevant guidance documents to provide a practical illustration of the elements that should be incorporated in a risk-based assessment of mobile money products. We also identif
Autor:
Scott Paladino, Craig A. Schiller, Dan Dunkel, Robert 'RSnake' Hansen, Anton Rager, Michael Gregg, Anton Chuvakin, Larry Chaffin, Jeremiah Grossman, Petko 'pdp' D. Petkov, Champ Clark, Seth Fogie
Publisher Summary Understanding how VoIP protocols function is important as it helps debug problems, assists in generating attacks in a security audit, and helps protect one against attacks targeting one Asterisk system. It involves a set of guidelin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c31c92fbf2abbfdf8f24d13d313930ec
https://doi.org/10.1016/b978-159749224-9.50014-0
https://doi.org/10.1016/b978-159749224-9.50014-0
Autor:
Larry Chaffin, Craig A. Schiller, Seth Fogie, Jeremiah Grossman, Anton Rager, Petko 'pdp' D. Petkov, Scott Paladino, Anton Chuvakin, Robert 'RSnake' Hansen, Champ Clark, Dan Dunkel, Michael Gregg
Publisher Summary Critical infrastructure allows for all of the modern-day conveniences. The health of the nation depends on the infrastructure that provides electricity, moves and controls water, provides gas and oil, and ensures the operation of ou
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67da758eff9d8852d87044df18d0e62b
https://doi.org/10.1016/b978-159749224-9.50010-3
https://doi.org/10.1016/b978-159749224-9.50010-3
Autor:
Scott Paladino, Craig A. Schiller, Seth Fogie, Champ Clark, Anton Rager, Dan Dunkel, Petko 'pdp' D. Petkov, Jeremiah Grossman, Michael Gregg, Larry Chaffin, Robert 'RSnake' Hansen, Anton Chuvakin
Publisher Summary People are not as consistent as machines as they don't all behave the same way under the same conditions. Some people refuse to follow basic security rules (e.g., do not read the necessary manuals, take shortcuts, and so on), while
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::434e8ee31049e1d6cbfb2bb739aecd60
https://doi.org/10.1016/b978-159749224-9.50016-4
https://doi.org/10.1016/b978-159749224-9.50016-4
Autor:
Scott Paladino, Seth Fogie, Anton Rager, Petko 'pdp' D. Petkov, Craig A. Schiller, Michael Gregg, Jeremiah Grossman, Dan Dunkel, Larry Chaffin, Champ Clark, Robert 'RSnake' Hansen, Anton Chuvakin
This chapter deals with cross-site scripting (XSS), which is an attack vector that can be used to steal sensitive information, hijack user sessions, and compromise the browser and the underplaying system integrity. XSS vulnerabilities have existed si
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6e028fb5a4f665908ec6f8a18d260811
https://doi.org/10.1016/b978-159749224-9.50007-3
https://doi.org/10.1016/b978-159749224-9.50007-3