1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
15

What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request

forgery? Against cross-site scripting?
Computers and Technology
1 answer:
g100num [7]3 years ago
6 0

Answer:

Cross-site request forgery requires a secure website or network that needs user authentication while Cross-site scripting is for websites with no user authentication policies.

Explanation:

Cross-site request forgery is a process used by hackers and network administrators to forcefully grant access to users on a secure website or network. If an administration trust a user who has lost his authentication details, he uses cross-site request forgery to give access to the user.

Cross-site scripting is basically javascript program execution from a server. It is not secure and vulnerable to attacks.

You might be interested in
You plan to use the Fill Down feature on a formula and you need to keep a cell reference the same. Which of the following format
yKpoI14uk [10]
A $E19 I now it because I am in college
6 0
3 years ago
Read 2 more answers
_______ is a variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.
Zanzabum
It's voice phishing but it's also sometimes referred to as vishing 
4 0
3 years ago
Working ____ means that you are viewing previously loaded or saved webpages in the browser, but you are not connected to the int
uysha [10]
Working offline is the answer
8 0
4 years ago
In two to three sentences, describe one tool used in project management and why it is used.
Ksenya-84 [330]

Answer:

Gantt Chart

Explanation:

Gantt chart can help in planning and managing projects by breaking a large project into a series of smaller tasks in an organized way.  It tracks both time and interdependencies between tasks. It is an important tool for showing phases, tasks, milestones & resources.

4 0
3 years ago
What is blue L.E.D. light
d1i1m1o1n [39]
The invention of blue LEDs meant that blue, red, and green could all be combined to produce white LED light, which can function as an alternative energy-saving light source.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Password procedures, information encryption software, and firewalls are examples of measures taken to address:
    13·1 answer
  • What are you guys doing?
    13·2 answers
  • Question 1 (True/False Worth 15 points)
    6·1 answer
  • with the _______ network topology, reliability is the major advantage while high cost is the disadvantage.
    10·2 answers
  • Which of the following method calls are legal?a. mathMethod(x);b. mathMethod(y);c. mathMethod(x, y);d. mathMethod(x + y);e. math
    5·1 answer
  • One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless c
    9·1 answer
  • ​Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs indiv
    12·1 answer
  • Which of these components is a part of the Central Processing Unit (CPU) of a computer?
    11·2 answers
  • Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. B
    10·1 answer
  • Assessment
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!