Warning: count(): Parameter must be an array or an object that implements Countable in /home/wormhole/public_html/db/blog.php on line 54

Warning: count(): Parameter must be an array or an object that implements Countable in /home/wormhole/public_html/db/blog.php on line 89
Archive Rescue - Anatomy of a Web App Attack & Info Graphic | Wormhole Web Works - Chico, Ca
Warning: Use of undefined constant HTTP_HOST - assumed 'HTTP_HOST' (this will throw an Error in a future version of PHP) in /home/wormhole/public_html/includes/meta-monkey.php on line 9

Warning: Use of undefined constant REQUEST_URI - assumed 'REQUEST_URI' (this will throw an Error in a future version of PHP) in /home/wormhole/public_html/includes/meta-monkey.php on line 9
 
  • Web App Attack Infographic Compressed

Archive Rescue - Anatomy of a Web App Attack & Info Graphic

Posted by Howard Phillips | Archive Rescue

 

In 2015 alone it’s estimated that almost one billion personal records were illegally accessed, specifically: Healthcare, Financial, Educational & Employee records. The kind of thing you might think would be stored ever-so securely.  Moreover, in 2015 we witnessed some of the most infamous hacks to date, namely: Ashley MadisonU.S. OPMTalkTalk, Carphone Warehouse.

 

The stories of these breaches stormed popular culture. In fact the term ‘hack(ing)’ is so pervasive, driven by the media’s love affair with it as a buzzword, you could assume that knowing its meaning was second nature. Yet it remains an ambiguous, mysterious and frightening topic for most.

 

In this infographic we look at the five stages of a Web App Attack from a Hacker’s perspective. We’ll go through each of the five stages and dissect them into the following:
 

Full Info Graphic Here

If there is one thing that you should take away from this Infographic, it is its motif: Without strong initial safeguards in place your system is increasingly defenseless. With each stage passed the probability of remediating the attack and putting a stop to the hacker lessens exponentially. Without an initial barricade there is not much you can do stop that hacker delving further into your system.

 

Jack Leonard  Jack Leanord.is a Multi-Disciplinerary Developer & Designer from Ireland. 

 

Share

Howard Phillips | Content Creation

With a keen sense of sharability, Howard creates copy and media designed to spread like electronic wildfire. His skill at communication drives our clients' conversions and his sense of humor keeps our office smiling.

Back to Top