1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
15

What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request

forgery? Against cross-site scripting?
Computers and Technology
1 answer:
g100num [7]3 years ago
6 0

Answer:

Cross-site request forgery requires a secure website or network that needs user authentication while Cross-site scripting is for websites with no user authentication policies.

Explanation:

Cross-site request forgery is a process used by hackers and network administrators to forcefully grant access to users on a secure website or network. If an administration trust a user who has lost his authentication details, he uses cross-site request forgery to give access to the user.

Cross-site scripting is basically javascript program execution from a server. It is not secure and vulnerable to attacks.

You might be interested in
1. Write a query in SQL to list the following information of the artists in movie industry. Limit this information to only 5 art
Rudik [331]

Answer:

1) SQL Server

SELECT  Top 5 concate(first name,' ',last name) AS Full name, Current age AS Age, state AS Address, Phone number AS Contact number from actor ORDERBY Current age DSC ;

2) MySQL

SELECT  concate(first name,' ',last name) AS Full name, Current age AS Age, state AS Address, Phone number AS Contact number from actor ORDERBY Current age DSC limit 5;

Explanation:

There two queries first having syntax works fine in SQL server and later with MySQL. All bold faced words are sql keywords. I assumed the tablename is actor as table name is not given if table name is any other replace actor with that name.

6 0
3 years ago
Is it true that if the user log out the computer will turn off automatically​
sergiy2304 [10]
Yes that is a true statement
8 0
3 years ago
Read 2 more answers
Imaging a computer is part of what phase of conversion?
grandymaker [24]
B. Because the computer can rearrange itself when it is in a phase of conversion
5 0
3 years ago
By what date must federal taxes typically be filed and sent to the IRS?
marishachu [46]
April 15th of each annual year
6 0
4 years ago
Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
Svet_ta [14]
The answer is D. Only student B is correct. Student A is incorrect because static electricity can be detected through the principle of electrostatic induction, which will indicate if there are static electricity on the surface of an object. A device which can detect static electricity is an electroscope. Moreover, for student B, it is correct that the cause for electric current to flow is the uniform flow of free electrons.
3 0
3 years ago
Other questions:
  • Ms. Rogers wants to see the names of all the students who scored below 25 on the test. Which of these custom options will help h
    5·1 answer
  • What is an image that you can apply to another image to add detail and texture?
    6·1 answer
  • You want to boot a linux system into singer user mode/ what options might you add to a linux kernel options list in a boot loade
    9·1 answer
  • Which is the hanging indent on the ruler?
    10·2 answers
  • Memory cards from your cameras (SD cards) and flash drives are examples of __________.
    13·1 answer
  • Hello i am indian eeee​
    10·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers.
    8·1 answer
  • I'll mark you the brainlest please help
    14·2 answers
  • Why is it important for organizations to make strong commitment to Cloud at scale?
    14·1 answer
  • A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!