Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Jeremiah Grossman"'
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It
Autor:
Jeremiah Grossman
Publikováno v:
Communications of the ACM. 56:68-72
Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.
Publikováno v:
Queue. 10:30-38
It seems every day we learn of some new security breach. It’s all there for the taking on the Internet: more and more sensitive data every second. As for privacy, we Facebook, we Google, we bank online, we shop online, we invest online& we put it a
Autor:
Jeremiah Grossman
Publikováno v:
Queue. 10:10-15
The Internet was designed to deliver information, but few people envisioned the vast amounts of information that would be involved or the personal nature of that information. Similarly, few could have foreseen the potential flaws in the design of the
Publikováno v:
SSRN Electronic Journal.
This paper examines various aspects of the FATF Recommendations and other relevant guidance documents to provide a practical illustration of the elements that should be incorporated in a risk-based assessment of mobile money products. We also identif
Autor:
Jeremiah Grossman
Publikováno v:
IEEE Security & Privacy. 10:91-93
This installment examines the state of website security, by the numbers. It also discusses the most effective way for organizations to achieve sustainable improvements in the security of the code they put on the Web.
Autor:
Larry Chaffin, Craig A. Schiller, Seth Fogie, Jeremiah Grossman, Anton Rager, Petko 'pdp' D. Petkov, Scott Paladino, Anton Chuvakin, Robert 'RSnake' Hansen, Champ Clark, Dan Dunkel, Michael Gregg
Publisher Summary Critical infrastructure allows for all of the modern-day conveniences. The health of the nation depends on the infrastructure that provides electricity, moves and controls water, provides gas and oil, and ensures the operation of ou
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67da758eff9d8852d87044df18d0e62b
https://doi.org/10.1016/b978-159749224-9.50010-3
https://doi.org/10.1016/b978-159749224-9.50010-3
Autor:
Scott Paladino, Craig A. Schiller, Seth Fogie, Champ Clark, Anton Rager, Dan Dunkel, Petko 'pdp' D. Petkov, Jeremiah Grossman, Michael Gregg, Larry Chaffin, Robert 'RSnake' Hansen, Anton Chuvakin
Publisher Summary People are not as consistent as machines as they don't all behave the same way under the same conditions. Some people refuse to follow basic security rules (e.g., do not read the necessary manuals, take shortcuts, and so on), while
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::434e8ee31049e1d6cbfb2bb739aecd60
https://doi.org/10.1016/b978-159749224-9.50016-4
https://doi.org/10.1016/b978-159749224-9.50016-4
Autor:
Scott Paladino, Seth Fogie, Anton Rager, Petko 'pdp' D. Petkov, Craig A. Schiller, Michael Gregg, Jeremiah Grossman, Dan Dunkel, Larry Chaffin, Champ Clark, Robert 'RSnake' Hansen, Anton Chuvakin
This chapter deals with cross-site scripting (XSS), which is an attack vector that can be used to steal sensitive information, hijack user sessions, and compromise the browser and the underplaying system integrity. XSS vulnerabilities have existed si
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6e028fb5a4f665908ec6f8a18d260811
https://doi.org/10.1016/b978-159749224-9.50007-3
https://doi.org/10.1016/b978-159749224-9.50007-3
Autor:
Dan Dunkel, Petko 'pdp' D. Petkov, Scott Paladino, Michael Gregg, Champ Clark, Larry Chaffin, Jeremiah Grossman, Seth Fogie, Craig A. Schiller, Anton Rager, Anton Chuvakin, Robert 'RSnake' Hansen
The Payment Card Industry (PCI) Data Security Standard (DSS) requirement to protect cardholder data encompasses two elements—protect stored cardholder data and encrypt the transmission of cardholder data across open, public networks. The processes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::23b248d492f36f1226c3189b9d97fa0b
https://doi.org/10.1016/b978-159749224-9.50013-9
https://doi.org/10.1016/b978-159749224-9.50013-9