February 2019
Intermediate to advanced
256 pages
7h 34m
English
Here we will look at how to identify vulnerabilities in private information when a web service goes live.
The insecure design of a website may result in the leaking or interception of private information. One of the most common ways in which information leakage can occur is by the use of insecure communication protocols, such as HTTP, Telnet, or FTP. These protocols are communicating messages without any encryption. The web administrator will need an automatic privacy scanning tool to do see whether this is an issue affecting them.
Here we introduce the use of PrivacyScore. It provides the following privacy inspections:
|
Privacy scan scenarios |
Examples |
|
No Track: No Browsing histories tracked ... |
Read now
Unlock full access