1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
15

What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request

forgery? Against cross-site scripting?
Computers and Technology
1 answer:
g100num [7]3 years ago
6 0

Answer:

Cross-site request forgery requires a secure website or network that needs user authentication while Cross-site scripting is for websites with no user authentication policies.

Explanation:

Cross-site request forgery is a process used by hackers and network administrators to forcefully grant access to users on a secure website or network. If an administration trust a user who has lost his authentication details, he uses cross-site request forgery to give access to the user.

Cross-site scripting is basically javascript program execution from a server. It is not secure and vulnerable to attacks.

You might be interested in
To edit the text in a smartart graphic, what must be done first ?
ICE Princess25 [194]
C Hope this helps :D
8 0
3 years ago
Read 2 more answers
A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
Vanyuwa [196]

Answer:

Three.

Explanation:

5 0
3 years ago
Drivers dealing with strong emotions may take risks they otherwise would not. <br> true false
grigory [225]

This is true because some people may be going through rough times and when they aren't they probably won't feel the same way as they do when they go through tough times.

7 0
3 years ago
In a packet voice communications system, a source transmits packets containing digitizedspeech to a receiver. Because transmissi
omeli [17]

The answer & explanation for this question is given in the attachment below.

5 0
4 years ago
What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
Sloan [31]

Comprehensive or hazard insurance

5 0
3 years ago
Other questions:
  • What type of user account should Tuan’s brother use?
    10·1 answer
  • . Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
    13·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • Explain how touch-tone dialing sends digits to the switch and write the name given to define touch-tone dialing.
    10·1 answer
  • Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
    8·1 answer
  • Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.
    6·1 answer
  • Use the variables k, d, and s so that they can read three different values from standard input--an integer, a double, and a stri
    15·1 answer
  • Note oj cyber security​
    6·1 answer
  • Discussion Topic
    8·1 answer
  • What is the decimal number 86 when written as a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!