Computer and Network Security

Table of Contents

Lecture 9: Web security

Overview

Requests:

Resource can be specified by absolute URI or absolute path. In HTTP/1.1, Host field is required to specify server to receive request. HTTP/2 lets server to push content (respond with data for more queries than client requested).

Replies:

Header fields:

URIs

Authentication

Maintaining State

Server side

Common Gateway Interface:

Active Server Pages (ASP, ASP.NET)

Servlets, JavaServer pages

PHP:

Web Application Frameworks

Client side

Java applets:

ActiveX controls

JavaScript/JScript, EcmaScript/VBScript

asm.js:

webassembly

Code is embedded into HTML pages using script tag. Window is top of hierarchy of objects. DOM (Document object model) lets your script manipulate content. BOM (Browser object model) is interface to browser’s properties.

JS security policies:

Site isolation

AJAX (asynchronous JavaScript and XML)

Possible attacks: