Posts

Showing posts from September, 2018

Using OAuth 2.0 Authorization framework

Image

Cross Site Request Forgery attacks mitigation

Image
Secure Software Systems Author - Viraj Dissanayake Ø Introduction              This article will be focusing on the understanding of the CSRF and the implementation of the mitigating these kind of attacks. Ø Cross site request forgery              Before moving on to the Overview of CSRF attacks, make sure to have a clear idea of these terms Ø Web applications             Web applications are the main target of CSRF attacks             Web applications are services which exposed by organizations on the internet             Most of the web applications rely on three components §   The client – throughout this article we consider the browser as the client §   The web server – forward the client requests to the application server §   The backend – a database Ø Client side HTTP methods(GET/POST)              GET – The most common request sent by the browser to request for content. All the parameters are send in query parameter