What are the components of a security evaluation?

September 12, 2008 0 Comments 0 tags

Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure

What are the advantages and disadvantages of honey pots?

September 11, 2008 0 Comments 0 tags

Honey pots have several advantages, which are as follows: * Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real

What are cryptographic attacks?

August 25, 2008 0 Comments 0 tags

Cryptographic attacks are methods of evading the security of a cryptographic system by finding weaknesses in such areas as the code, cipher, cryptographic protocol or key management scheme in the

How does the form-based authentication scheme work?

August 19, 2008 0 Comments 0 tags

The form-based authentication scheme works in the following manner: * A client generates a request for a protected resource (e.g. a transaction details page). * The Internet Information Server (IIS)

IP spoofing

August 13, 2008 0 Comments 0 tags

IP spoofing is about the most advanced attack that can be executed on a computer system. IP spoofing, if done correctly, is one of the smoothest and hardest attacks on

XSS Stealing Cookies

August 13, 2008 0 Comments 0 tags

This method (XSS attacks) is for get the cookies users, so, for get information of users… and then, login into the account of the victim user…u will have to give

How does a cross site scripting (XSS) attack work?

August 11, 2008 0 Comments 0 tags

A cross site scripting attack works in the following manner: * The attacker identifies a web site that has one or more XSS bugs for example, a web site that