Protecting Your APIs Against Attack & Hijack

Protecting Your APIs Against Attack & Hijack

Cover

Application programming interface (API), a technology for integrating applications using Web technology. Leveraging well-understood techniques and existing infrastructure, API adoption is a logical step to help companies with efficient integration.

How can your organization address threat vectors, both from the conventional Web as well as a new class of risk brought about by the differences between API and Web sites?

This white paper identifies these threats, both old and new, and provides clear solutions to address them including:

  • Parameter attacks that exploit data sent into an API
  • Identity attacks that exploit flaws in authentication, authorization and session tracking
  • Interception of legitimate transactions to exploit unencrypted data
  • And more
Vendor:
CA Technologies.
Posted:
12 Dec 2013
Published:
12 Dec 2013
Format:
PDF
Length:
12 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor