SlideShare a Scribd company logo
Cyber security
Cyber security
• CSRF - CROSS-SITE REQUEST FORGERY
• XSS - CROSS-SITE SCRIPTING
• PASSWORD HASHING
• SQL INJECTION
• SESSION HIJACKING
CSRF - CROSS-SITE REQUEST FORGERY
CSRF - CROSS-SITE REQUEST FORGERY
•
•
•
• PROTECT_FROM_FORGERY WITH: :EXCEPTION
• AS A USER – LOGOUT!
XSS - CROSS-SITE SCRIPTING
XSS - CROSS-SITE SCRIPTING
•
•
•
•
•
•
•
PASSWORD HASHING
PASSWORD HASHING
•
•
•
•
•
SQL INJECTION
SQL INJECTION
•
•
•
SESSION HIJACKING
SESSION HIJACKING
•
•
•
•
• HTTP://GUIDES.RUBYONRAILS.ORG/SECURITY.HTML
• HTTPS://WWW.OWASP.ORG/INDEX.PHP/MAIN_PAGE
• HTTPS://WWW.SPECTORY.COM/BLOG/IMPROVE%20YOUR%20WEB%20APPLICATION%20SEC
URITY
Cyber security

More Related Content

PPTX
Your Web Application Is Most Likely Insecure
PDF
PDF
Programming ten commandments
PDF
PDF
Asynchronous development in JavaScript
PDF
2024 Trend Updates: What Really Works In SEO & Content Marketing
PDF
Storytelling For The Web: Integrate Storytelling in your Design Process
Your Web Application Is Most Likely Insecure
Programming ten commandments
Asynchronous development in JavaScript
2024 Trend Updates: What Really Works In SEO & Content Marketing
Storytelling For The Web: Integrate Storytelling in your Design Process

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
top salesforce developer skills in 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
System and Network Administraation Chapter 3
PDF
System and Network Administration Chapter 2
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PTS Company Brochure 2025 (1).pdf.......
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Softaken Excel to vCard Converter Software.pdf
ISO 45001 Occupational Health and Safety Management System
Internet Downloader Manager (IDM) Crack 6.42 Build 41
top salesforce developer skills in 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
How to Migrate SBCGlobal Email to Yahoo Easily
System and Network Administraation Chapter 3
System and Network Administration Chapter 2
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Wondershare Filmora 15 Crack With Activation Key [2025
VVF-Customer-Presentation2025-Ver1.9.pptx
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Odoo Companies in India – Driving Business Transformation.pdf
ai tools demonstartion for schools and inter college
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Ad
Ad

Cyber security