Cookie Poisoning:
cookies supposed to send back to server unchanged, but the attacker can have changed the value and sent different information to the server. Integrity and confidentiality:
Most of website only stores the random and generated unique identifies in cookie, and other are stored on the server. Help to eliminates the threat of cookie poisoning.
Cookie
Cookie Inaccuracies: Carrying inaccuracies data and information.
Some issues different people used same computer, Brower and user account will unavoidably share cookies.
Cross-site cooking:
Which help the attacker to set the cookie for a browser into the cookie domain of another site servers and attack the site itself. …show more content…
Attacker can use for future attack to open the unauthorized data using this vulnerability.
For example: changing id.
Vulnerabilities for AES-256/ECB which he plans to use to encrypt the contents of back up tapes that are sent to an offsite storage facility.
Backup encryption is one of the significant and effective way to the security strategy.
It always significant to test the method. As a firm raises, information and data safety needs modification, so the information security performs must change as well.
Vulnerability for symmetric key encryption:
A cryptographic system can only be as durable as the encryption algorithms, digital signature algorithms, one-way hash functions, and message authentication codes it relies on.
Symmetric -key: same kind of private keys use by different users and share it. Public keys are for the encryption of data, while private key is the purpose in the decryption of data, but key exchange don’t ensure both parties receive the same