Page 4 - Cybersecurity_Flipbook_17Aug2020
P. 4

Web Environments Threats





                                                                                                                    Click each common type of web-based
     PLACEHOLDER:
     Provide introduction, context, or commentary for the
     web environment threats. For example – What is                                                      Types of vulnerabilities and threats
     “Action”? Who takes it? When is it taken? How will
     the learner user this information in the future?                                                    Information gathering

                                                                                                         Spidering or crawling a website


                                                                                                         Administrative interfaces


                                                                                                         Authentication and access control

                                                                                                         Countermeasures


                                                                                                         Cross-site request forgery (CSRF)




                                                                                        PLACEHOLDER:

                                                                                         Additional     space      for    context      or
                                                                                        commentary, depending on needs.
   1   2   3   4   5