Question

Identify the different security restrictions available in JavaScriptand discuss how they help to protect users. Are...

Identify the different security restrictions available in JavaScriptand discuss how they help to protect users. Are there ways in which these security restrictions can be bypassed? Discuss your thoughts on security considerations that web designers should take. If no personally identifiable information is collected by webpages, do web designers need to be concerned about security?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Javascript is a very powerful scripting language that urns in our web browser. Different security restrictions are discussed below:
Cross-Sire Scripting (XSS) is one of the most common JS security vulneribilily. It enebles the attackers to manipulate websites and return malicious scripts to the users.

• Since JS runs in a web browse, so it gets executed on user's resources (i.e. computers) and thus saving bandwidth a. load on the web server.

JS snippets executes immediately on user's system, therefore it can he used . exploit user's system. Though modern web browsers provide a minimum security protection, but still there is a possibility where malicious code can be executed.
Security considerations that web designers should rake:
• Protect privacy using design framework. The more user data you collect, the more responsibility you have to protect their data.

• While desgning and developing, web designers must work together with the web developers.

• Avoid XSS at any cost.
If no personally identifiable information is collected by webpages, then web designers do not need to be concern. about security .o much, as hackers are more interested in user's data. So If no personally identifiable information is collected, then you can safely assume that no hacker would be irtteretted to hack your website.

Add a comment
Know the answer?
Add Answer to:
Identify the different security restrictions available in JavaScriptand discuss how they help to protect users. Are...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked for your help in dealing with securing their information while they remain within set regulatio...

    Task 3: Analysis of Case Study on Regulating Information Security for the Company: TransManuCo has asked for your help in dealing with securing their information while they remain within set regulations. In order to do business efficiently and effectively the company uses eSign. However, they have concerns about the security of this especially with clients overseas. According to the new Protecting Cyber Networks Act Sec. 103 “Permits private entities to monitor or operate defensive measures to prevent or mitigate cybersecurity...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • 1: Online analytical processing tools enable users to ________. A: extract textual information from Web documents...

    1: Online analytical processing tools enable users to ________. A: extract textual information from Web documents B: group related records together based on having similar values for attributes C: analyze different dimensions of data beyond simple data summaries D: discover hidden predictive relationships in the data E: find associations or correlations among sets of items 2: Which of the following statements is true about an explicit knowledge asset? A: It reflects an individual's special knowledge about a new-to-the-world product. B:...

  • I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults...

    I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government.” Andrew Hawn, my former colleague and now founder of MetaForesight, is a technology, media and content expert. Andrew has been collaborating with my analytic startup, Metametrix, and we recently spoke about privacy and its far-reaching implications. “We’re seeing a social...

  • You must write a minimum 1-page journal paper about one of the situations below. Discuss what different courses of actio...

    You must write a minimum 1-page journal paper about one of the situations below. Discuss what different courses of action you could take in response and explore the consequences of each of those choices. There are no RIGHT answers to the first situation. The second option definitely has some things that may be wrong. :) You're working at a retail pharmacy and you find a faxed prescription on the fax machine. The prescription is not for a controlled substance and...

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Is it possible for anyone to help me with this assignment that I need in like...

    Is it possible for anyone to help me with this assignment that I need in like 5 hours? Part I: General HCI Questions 1) The "Start" button in Windows is located by default at the bottom left corner of the screen. How might you make accessing the "Start" button faster? What is the name of the principle you are relying on from the principals identified by Donald Norman and Section 1.6 from the textbook (visibility, feedback, constraints, consistency, affordance). What...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT