From the course: Cybersecurity Foundations: Application Security
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Improper authentication
From the course: Cybersecurity Foundations: Application Security
Improper authentication
- [Narrator] Most applications require authentication to protect the confidentiality of user data. This ensures that an individual performing an action is who they say they are. Application authentication is typically achieved through a username and password combination and augmented with multifactor authentication nowadays. An improper authentication vulnerability occurs when an application does not properly ascertain the identity of a user. This leads to account takeovers and data breaches. One way an improper authentication vulnerability can occur is when users are allowed access to authenticated functions directly without having to log in first. Another way is when there's a lack of rate limiting on login fields, especially when the field lengths are known. We'll take a look at both scenarios in this video. In this first example, this social media application allows only signed in users to view posts. When a user…