Content Security Policy

Content Security Policy

Content Security Policy (CSP) ist ein Sicherheitskonzept, um Cross-Site Scripting und andere Angriffe durch Einschleusen von Daten zu verhindern.[1] Es wurde von der Mozilla Foundation entwickelt.

Einzelnachweise

  1. Sid Stamm: Security/CSP/Spec - MozillaWiki. Background. In: wiki.mozilla.org. 11. März 2009, abgerufen am 29. Juni 2011 (englisch): „Content Security Policy is intended to help web designers or server administrators specify how content interacts on their web sites. It helps mitigate and detect types of attacks such as XSS and data injection.“

Wikimedia Foundation.

Игры ⚽ Нужен реферат?

Schlagen Sie auch in anderen Wörterbüchern nach:

  • Digital Transition Content Security Act — The United States The Digital Transition Content Security Act (DTCSA, H.R. 4569) was a bill introduced by House Judiciary Committee Chairman James Sensenbrenner Jr., a Wisconsin Republican, on December 16, 2005. The bill was backed by Democratic… …   Wikipedia

  • Outbound content security — Outbound Content Compliance (also outbound content security) is a new segment of the computer security field, which aims to detect and prevent outbound content that violates policy of the organization and/or government regulations. It deals with… …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… …   Wikipedia

  • Policy — This article is about policies in general. For government policy, see Public policy. For other uses, see Policy (disambiguation). A policy is typically described as a principle or rule to guide decisions and achieve rational outcome(s). The term… …   Wikipedia

  • Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Scan — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Security Test — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

  • Policy appliances — are technical control and logging mechanisms to enforce or reconcile policy rules (information use rules) and to ensure accountability in information systems. [The use of policy appliances in this context was first described in K. A. Taipale,… …   Wikipedia

  • Content-addressable storage — Content addressable storage, also referred to as associative storage or abbreviated CAS, is a mechanism for storing information that can be retrieved based on its content, not its storage location. It is typically used for high speed storage and… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”