Cross Site Request Forgery attacks mitigation
Secure Software Systems Author - Viraj Dissanayake Ø Introduction This article will be focusing on the understanding of the CSRF and the implementation of the mitigating these kind of attacks. Ø Cross site request forgery Before moving on to the Overview of CSRF attacks, make sure to have a clear idea of these terms Ø Web applications Web applications are the main target of CSRF attacks Web applications are services which exposed by organizations on the internet Most of the web applications rely on three components § The client – throughout this article we consider the browser as the client § The web server – forward the client requests to the application server § The backend – a database Ø Client side HTTP methods(GET/POST) GET – The most common request sent by the browser to request for content. All the parameters are send in query parameter
Comments
Post a Comment