Kromann, 2018 - Google Patents
Secure php programmingKromann, 2018
- Document ID
- 18026557156747325374
- Author
- Kromann F
- Publication year
- Publication venue
- Beginning PHP and MySQL: From Novice to Professional
External Links
Snippet
Any web site or service exposed on the Internet can be thought of as a castle under constant attack by a sea of barbarians. And as the history of both conventional and information warfare shows, the attacker's victory isn't entirely dependent upon their degree of skill or …
- 230000001419 dependent 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12413624B2 (en) | Cyber secure communications system | |
| US10834082B2 (en) | Client/server security by executing instructions and rendering client application instructions | |
| JP6545136B2 (en) | System and method for encrypted transmission of web pages | |
| US10970378B2 (en) | Secure generation and verification of machine-readable visual codes | |
| Shakevsky et al. | Trust dies in darkness: Shedding light on samsung's {TrustZone} keymaster design | |
| Ristic | Apache security | |
| Greveler et al. | A privacy preserving system for cloud computing | |
| Kromann | Secure php programming | |
| Park et al. | Cyber threats to mobile messenger apps from identity cloning | |
| Bang et al. | On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers | |
| Marchesini et al. | Keyjacking: Risks of the current client-side infrastructure | |
| Lakhapati et al. | Cross site scripting attack | |
| US12445493B2 (en) | Monitoring cloud computing resources | |
| Mohamed | Analytical view of web security and sophisticated ways to improve web security | |
| Afek et al. | Localhost detour from public to private networks | |
| Baker | Secure Web Application Development | |
| Serrhini et al. | Improve security of web Browser with stand-alone e-Learning awareness application | |
| Validating | Securing Your Web Site | |
| Sahu | PHP Core Security | |
| Wadkar et al. | A FRAMEWORK FOR SECURE WEB BROWSING, USING TRUSTED PLATFORM MODULE (TPM). | |
| Norberg | Software Security Overview | |
| WO2016186817A1 (en) | Client/server security by an intermediary executing instructions received from a server and rendering client application instructions | |
| Bodak et al. | Secure Authentication Model for Public Clients | |
| Dora et al. | A Theoretical Review of Mitigation Techniques for Thick Client Application Vulnerabilities | |
| Wadkar et al. | Secure Web Browsing Using Trusted Platform Module (TPM) |