Attack Prevention Essay

738 Words Apr 1st, 2012 3 Pages
Attack Prevention Paper The article that was chosen for the review was Simple Cross-Site Attack Prevention by Florian Kerschbaum. This article covers what a cross-site attack is, how attackers use them and how vulnerable web applications can be. In this paper we will look at what the problem is as the original author sees it. We will also look at resolutions that could be done to prevent this kind of attacks. In this article the author explains how a simple cross-site attack can take place and goes on to explain what a solution for this problem is. This article starts out by explaining what a cross-site attack is and how they take place with some examples. According to Kerschbaum “A reflected cross-site scripting attack or …show more content…
Then when the end user logs in the fake site sends the end user to Ebay or Paypal and at the same time sends the username and password to another site to record the information. In the computer service field you hear about this all the time when an end user calls a help desk and tries to find out what has happened to his or her money that they had on Paypal. Most of the time Paypal cannot do anything about it except to have you change your password. Paypal also put out emails and messages on their website to let all end users know that Paypal will never send you a link to their website. If Paypal needs you to login they will just tell you to login in by going to their website this way they know that you are typing the web address into the browser to get to the site. The author gives a sound conclusion stating the problem and a description one how to resolve the issue. The author urges other companies of all sizes to use the same algorithm that his company uses to prevent these types of attacks from happening. When reading this article this author could see the relevant to today’s users and how these attacks are still happening. Everyone that reads this article should come away with knowledge of what cross-site attacks are and how to prevent them from happening. This author has since this article to a few of the

Related Documents