Protecting Your APIs Against Attack & Hijack

Protecting Your APIs Against Attack & Hijack


Application programming interface (API), a technology for integrating applications using Web technology. Leveraging well-understood techniques and existing infrastructure, API adoption is a logical step to help companies with efficient integration.

How can your organization address threat vectors, both from the conventional Web as well as a new class of risk brought about by the differences between API and Web sites?

This white paper identifies these threats, both old and new, and provides clear solutions to address them including:

  • Parameter attacks that exploit data sent into an API
  • Identity attacks that exploit flaws in authentication, authorization and session tracking
  • Interception of legitimate transactions to exploit unencrypted data
  • And more
CA Technologies.
12 Dec 2013
12 Dec 2013
12 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor