What are the possible damages caused by a cross-site scripting attack?

What will be an ideal response?


XSS can be used with phishing to reach a broad range of Internet users in order to maliciously obtain sensitive information. Information or identity could be stolen with a simple click from a user. Every month, roughly 10 to 25 XSS security holes are found in commercial products, and advisories are published explaining the threat. XSS security holes are damaging and costly to business. Attackers will often disclose these holes to the public, which can erode customer and public confidence in the security and privacy of the company running the Web site and/or Web application.

Computer Science & Information Technology

You might also like to view...

The ________ function returns the current system date

A) Date B) DatePart C) DateSerial D) Now

Computer Science & Information Technology

Copyright law is a type of intellectual property law that protects ____.

A. books B. the expression of an idea C. underlying facts D. artwork

Computer Science & Information Technology

Match the recommended field types with their definitions or examples:I.CalculateII.Lookup WizardIII.Short textIV.NumberV.CurrencyA.Can hold up to 255 charactersB.Used to force users to pick from a custom listC.Can be set to EurosD.References one or more existing fieldsE.Used if you want to store a dollar sign ($) in your data

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The superscalar approach has now become the standard method for implementing high-performance microprocessors. 2. In a traditional scalar organization there is a single pipelined functional unit for integer operations and one for floating-point operations. 3. In the scalar organization there are multiple functional units, each of which is implemented as a pipeline and provides a degree of parallelism by virtue of its pipelined structure. 4. The superscalar approach depends on the ability to execute multiple instructions in parallel. 5. True data dependency is also called flow dependency or read after write (RAW) dependency.

Computer Science & Information Technology