Please enable JavaScript.
Coggle requires JavaScript to display documents.
Web Security - Coggle Diagram
Web Security
Countermeasure
Secure Protocols
Strong authentication, challenge-response dialog, encryption, and access control can be included in protocol design to counter various integrity threats
-
-
-
User Education
Users who understand and appreciate security can act in ways that complement more technical security countermeasures
They exercise sound judgment, choose secure options, and act responsibly in situations not covered by other technical countermeasures
Cooperation from the user is essential, and users should be informed of the risks and threats inherent in computing
Vulnerability
-
-
Protocol Weakness
All web page traffic travels under the generic HTTP protocol, which is best suited to flat data files for static display on a screen
Attack
Forgeries
-
Fake Website
Change the values of links to redirect the unsuspecting
victim to points of the attacker’s choosing
-
-
-