Security

How does WAF work?

WAF usually resides in front of web servers, by placing a filtration barrier between the targeted server and the attacker. the WAF is able to protect against attacks like cross-site forgery, cross-site scripting and SQL injection in real time. Learn more about mlytics Enhanced Security feature. Working model Positive Security Model – PSM or Whitelisting only allows web …

How does WAF work? Read More »

Types of DDoS attacks

DDoS attacks are generally classified into the following 3 categories: Volumetric attacks: This category of exploited method attempts to create congestion by consuming all available bandwidth between the target and the larger Internet. Large amounts of data are sent to a target by using a form of amplification or another means of creating massive traffic, …

Types of DDoS attacks Read More »

What is a Distributed Denial-of-Service (DDoS) attack?

Distributed Denial-of-Service (DDoS) attacks are malicious attempts to block businesses from its traffic. During a DDoS attack, the target server/service/network is flooded with malicious traffic generated by exploited systems on the internet. At the same time, legitimate customers and users cannot access the target. How does a DDoS attack work? A DDoS attack requires an …

What is a Distributed Denial-of-Service (DDoS) attack? Read More »

Common threats to web application

Web attacks refer to a category of cyber-attacks that generally occur on or through a website. The most common ones are SQL injection, cross-site scripting, remote file inclusion, and brute force attacks. The risk of attack that each website faces depends on the motive of the attacker, security of the site and the information assets …

Common threats to web application Read More »

What is web application security?

Nearly every business organization has a website or several websites which they use to offer their services as well as interact with their customers. Websites are beneficial since they enable a company to offer its services twenty-four hours, seven days a week. Such web-based services normally involve the exchange of a lot of sensitive information …

What is web application security? Read More »