Featured Post
Church to Connect Essay Example for Free
Church to Connect Essay ââ¬Å"Our future isn't to be found in our protection yet in our investmentâ⬠(19). ââ¬Å"The...
Sunday, February 2, 2020
IT questions Coursework Example | Topics and Well Written Essays - 500 words
IT questions - Coursework Example Cookies are usually associated with four main vulnerabilities; the first one is ââ¬Ëcross-site cookingââ¬â¢. This entails the existence of browser flows that create loop-holes for malicious attack. Another vulnerability associated with cookies is cookie inaccuracies; these are instances where cookies may indicate inaccurate data. In addition, there is the vulnerability of cookie poisoning. This occurs when web attackers modify the content of cookies before re-sending to the server. Consequently, cookies are usually ascribed to cookie theft where: Cookies sent through ordinary HTTP are accessible to anyone. However, these vulnerabilities can be reduced through web vulnerability detection code review. One of the Document Object Model that can be used to make web pages dynamic is the use of JavaScript. This can be used in combination with W3C and may entail the use of array objects, number object, math object, date object et cetera. Moreover, HTML DOM is another method used to create dynamic web pages it entails the use of objects such as: HTML elements, HTML document, HTML attributes et cetera. Image caching is an aspect of ICT that has not been applied in many web development processes; however, computer experts have asserted that this is an imperative aspect of web design that ought to be taken into consideration. Image caching is basically a duplication of the original data for ease of retrieval. Image cache facilitates increasing the speed with, which a web functions. Lack of implementing the use of image cache basically reduces the speed of oneââ¬â¢s computer usage. Detecting Web Application Security Vulnerabilities - OReilly Media. (n.d.). Detecting Web Application Security Vulnerabilities - OReilly Media. Retrieved March 2, 2014, from
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.