Page 4 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 4
Web Environment Threats
Click on each of the following boxes to learn more about the more common vulnerabilities
Vulnerabilities and threats and threats exploited by threat actors.
Threat actors have become very creative in finding new ways to gain a foothold
onto a company’s network. Through an extensive trial-and-error effort, the actors Types of vulnerabilities and threats
have identified creative ways of exploiting design flaws in the growing list of web
applications to gain this foothold. Information gathering
This exposure occurs because most web developers focus on developing Spidering or crawling a website
applications that are functionally rich to create a positive user experience;
security is often an afterthought. Administrative interfaces
Authentication and access control
Countermeasures
Cross-site request forgery (CSRF)