Security / Data Structure Attacks
Focusing in on possible data structure attacks that can occur probing and opening up holes in common backend data sources, and approaches to making data resources available.
Notes: |
Logic/time Bomb | ||
Trojan Horse | ||
Account Lockout Attack | ||
Cross-Site Request Forgery (CSRF) | ||
Execution After Redirect (EAR) | ||
Session Fixation | ||
Session Hijacking Attack | ||
Session Prediction |
|
|
|