top of page

Difference between multiple security terms





Encoding

Maintaining data usability

Reversed data by  employing same algorithm

No secret key

Encryption

Maintaining data confidentiality

Reversed data by  secret key

Use key

Hashing

Validating the integrity of content

Validate through the signature

Signature by a sender


SQL Injection

Display error message

It does not ask ant question

Attacker see the result

Blind SQL Injection

Does not see an error message

It ask a true and false question to database

Attacker not see the result


SQL Injection

Inserting query syntax

Attacker send simple text based syntax

Injecting SQL field value in the form of regular expression

It can be easily effected

Cross-Site Scripting

Embedded script tags in URL

Attacker send simple text based script

Simple HTML tags in the form of the regular expression

It can be affect with average vulnerability


Cross-Site Scripting

It doesn’t need authentication

Escape the basic validating

Need of java script

A site that is vulnerable to XSS attacks is also vulnerable to CSRF attacks

Cross-Site Request Forgery

Authenticated Session

Server trust the user

Not need of javascript

A site that is completely protected from XSS types of attacks is still most likely vulnerable to CSRF attacks.



18 views0 comments

Recent Posts

See All
bottom of page