Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Clickjacking

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
It is also called as User Interface redress attack (UI redress attack). It is a malicious activity performed by the attacker to gain access to user confidential information. In this user is dodged to click on something (malicious URL) which is different from what is perceived by the user.
Published in Chapter:
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
Pooja Chaudhary (National Institute of Technology Kurukshetra, India), Shashank Gupta (National Institute of Technology Kurukshetra, India), and B. B. Gupta (National Institute of Technology Kurukshetra, India)
DOI: 10.4018/978-1-5225-0105-3.ch010
Abstract
Nowadays, users of Online Social Network (OSN) are less familiar with cyber security threats that occur in such networks, comprising Cross-Site Scripting (XSS) worms, Distributed Denial of Service (DDoS) attacks, Phishing, etc. Numerous defensive methodologies exist for mitigating the effect of DDoS attacks and Phishing vulnerabilities from OSN. However, till now, no such robust defensive solution is proposed for the complete alleviation of XSS worms from such networks. This chapter discusses the detailed incidences of XSS attacks in the recent period on the platforms of OSN. A high level of taxonomy of XSS worms is illustrated in this article for the precise interpretation of its exploitation in multiple applications of OSN like Facebook, Twitter, LinkedIn, etc. We have also discussed the key contributions of current defensive solutions of XSS attacks on the existing platforms of OSN. Based on this study, we identified the current performance issues in these existing solutions and recommend future research guidelines.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Marketing Vulnerabilities in an Age of Online Commerce
Tricking browser users into clicking on content that that is controlled by a hidden hyperlink, leading the user to content that was not expected, such as a different website or the downloading of malware.
Full Text Chapter Download: US $37.50 Add to Cart
Hijacking of Clicks: Attacks and Mitigation Techniques
Stealing of clickable actions on web page through overlay frame.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR