Page 4 - Cybersecurity_Flipbook_17Aug2020
P. 4
Web Environments Threats
Click each common type of web-based
PLACEHOLDER:
Provide introduction, context, or commentary for the
web environment threats. For example – What is Types of vulnerabilities and threats
“Action”? Who takes it? When is it taken? How will
the learner user this information in the future? Information gathering
Spidering or crawling a website
Administrative interfaces
Authentication and access control
Countermeasures
Cross-site request forgery (CSRF)
PLACEHOLDER:
Additional space for context or
commentary, depending on needs.