Friendly Computer  Services Forum Index Friendly Computer Services
Computer support and tech
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 




Search found 5 matches
Friendly Computer Services Forum Index
Author Message
  Topic: Vulnerabilities in web application
ambersail489

Replies: 0
Views: 123

PostForum: General Chat   Posted: Fri Jul 12, 2013 9:30 pm   Subject: Vulnerabilities in web application
Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds o ...
  Topic: Define vulnerability
ambersail489

Replies: 0
Views: 131

PostForum: General Chat   Posted: Fri Jul 12, 2013 9:29 pm   Subject: Define vulnerability
A vulnerability is a flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy. A threat is a potential attack ...
  Topic: Active analysis of an application
ambersail489

Replies: 0
Views: 149

PostForum: General Chat   Posted: Fri Jul 12, 2013 9:29 pm   Subject: Active analysis of an application
The process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities. Any security issues that are found will be presented to the system owner together wi ...
  Topic: Penetration test
ambersail489

Replies: 0
Views: 123

PostForum: General Chat   Posted: Fri Jul 12, 2013 9:29 pm   Subject: Penetration test
A penetration test is a method of evaluating the security of a computer system or network by simulating an attack. A Web Application Penetration Test focuses only on evaluating the security of a web a ...
  Topic: SQL injection
ambersail489

Replies: 0
Views: 123

PostForum: General Chat   Posted: Fri Jul 12, 2013 9:28 pm   Subject: SQL injection
You will inject SQL into back-end databases, learning how attackers exfiltrate sensitive data. You will utilize cross-site scripting attacks to dominate a target infrastructure in our unique hands-on ...
 
Page 1 of 1
All times are GMT + 12 Hours
Jump to:  


Forum hosted by ForumsLand.com - 100% free forum. Powered by phpBB 2.