Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Insufficient Authorization

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
It occurs due to improper authorization of user to ensure that user is performing the actions according to the defined policies.
Published in Chapter:
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
Pooja Chaudhary (National Institute of Technology Kurukshetra, India), Shashank Gupta (National Institute of Technology Kurukshetra, India), and B. B. Gupta (National Institute of Technology Kurukshetra, India)
DOI: 10.4018/978-1-5225-0105-3.ch010
Abstract
Nowadays, users of Online Social Network (OSN) are less familiar with cyber security threats that occur in such networks, comprising Cross-Site Scripting (XSS) worms, Distributed Denial of Service (DDoS) attacks, Phishing, etc. Numerous defensive methodologies exist for mitigating the effect of DDoS attacks and Phishing vulnerabilities from OSN. However, till now, no such robust defensive solution is proposed for the complete alleviation of XSS worms from such networks. This chapter discusses the detailed incidences of XSS attacks in the recent period on the platforms of OSN. A high level of taxonomy of XSS worms is illustrated in this article for the precise interpretation of its exploitation in multiple applications of OSN like Facebook, Twitter, LinkedIn, etc. We have also discussed the key contributions of current defensive solutions of XSS attacks on the existing platforms of OSN. Based on this study, we identified the current performance issues in these existing solutions and recommend future research guidelines.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It occurs due to improper authorization of user to ensure that user is performing the actions according to the defined policies.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR