Securing Authentication
Implementing a secure authentication solution involves attempting to simultaneously meet several key security objectives, and in many cases trade off
Read moreImplementing a secure authentication solution involves attempting to simultaneously meet several key security objectives, and in many cases trade off
Read moreSome applications use elaborate login mechanisms involving multiple stages. For example: ■ Entry of a username and password. ■ A
Read moreEven a well-designed authentication mechanism may be highly insecure due to mistakes made in its implementation. These mistakes may lead
Read moreLike password change functionality, mechanisms for recovering from a forgotten password situation often introduce problems that may have been avoided
Read moreSurprisingly, many web applications do not provide any way for users to change their password. However, this functionality is necessary
Read moreIf an application uses an unencrypted HTTP connection to transmit login credentials, an eavesdropper who is suitably positioned on the
Read moreTransmitting Data via the Client Many applications leave themselves exposed because they transmit critical data such as product prices and
Read more