Anatomy of a Web attack

Understanding the most common attack types

From the developerWorks archives

Sean-Philip Oriyano

Date archived: January 4, 2017 | First published: February 03, 2009

More applications are being hosted on the Internet than ever before. Everything from databases to services is moving to a Web-based format. As a matter of course, this increased number of applications and services on the Internet has led to an ever-increasing number of attacks targeted at them. Learn how some of the more popular attacks work so that you can protect your organization.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Web development
ArticleID=367792
ArticleTitle=Anatomy of a Web attack
publish-date=02032009