Open in app
Home
Notifications
Lists
Stories

Write
Ruween Iddagoda
Ruween Iddagoda

Home

Feb 21

Synchronizer Token Pattern for Cross-Site Request Forgery Prevention

Within the contemporary context in which most of the communication and transactions are taking place over the web, the data being transferred are susceptible to many forms of attacks. An eminent attack type out of many is the Cross-Site Request Forgery attack. …

5 min read

Synchronizer Token Pattern for Cross-Site Request Forgery Prevention
Synchronizer Token Pattern for Cross-Site Request Forgery Prevention

Feb 21

Double Submit Cookie for Cross-Site Request Forgery Prevention

One of the extensively used alternatives for Synchronizer Token Pattern, for protection against Cross-Site Request Forgery, is the Double Submit Cookie. Double Submitting cookies, as the name suggest, is sending an arbitrary unique generated value, both as a cookie and a POST data, where the server compares the two to…

3 min read

Double Submit Cookie for Cross-Site Request Forgery Prevention
Double Submit Cookie for Cross-Site Request Forgery Prevention

Feb 21

OWASP API Top 10

What is API security? An Application Programming Interface (API) can be defined as the middle man to a program’s backbone. Modern software is designed as stacks, more like sandwiches and APIs rest in the middle acting as a communicating relay between the program and the hardware drivers. Or else, from a web developer’s point…

Owasp

9 min read

What is API security?
What is API security?

Feb 21

Practical Approach to Implementing ISO 27001 — summary

What is ISO 27001? It is one of the standards introduced by the International Organization of Standardization (ISO) to assist in managing the security of assets such as intellectual property, financial information, employee details or information entrusted to you by third parties. Basically, it provides the requirements for an Information Security Management System (ISMS). …

Iso 27001 Implementation

5 min read

Practical Approach to Implementing ISO 27001 — summary
Practical Approach to Implementing ISO 27001 — summary

Feb 21

How to setup Multi-factor Authentication with OpenVPN Community Edition

Overview of the Process User executes google-authenticator to generate the QR code and verification code (secrets) User connects a MFA enabled device by scanning the QR code presented. Verfication code must be installed (stored) onto the VPN server itself During the authentication, OpenVPN will call the PAM module to perform verification on the user…

MFA

2 min read

Ruween Iddagoda

Ruween Iddagoda

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable