Page 4 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 4

Web Environment Threats





                                                                                                        Click on each of the following boxes to learn more about the more common vulnerabilities
     Vulnerabilities and threats                                                                        and threats exploited by threat actors.
     Threat actors have become very creative in finding new ways to gain a foothold
     onto a company’s network. Through an extensive trial-and-error effort, the actors                   Types of vulnerabilities and threats
     have identified creative ways of exploiting design flaws in the growing list of web
     applications to gain this foothold.                                                                 Information gathering


     This exposure occurs because most web developers focus on developing                                Spidering or crawling a website
     applications that are functionally rich to create a positive user experience;
     security is often an afterthought.                                                                  Administrative interfaces

                                                                                                         Authentication and access control


                                                                                                         Countermeasures


                                                                                                         Cross-site request forgery (CSRF)
   1   2   3   4   5   6