Whitepaper oversigt

Understanding Your Credential Stuffing Attack Surface

Understanding Your Credential Stuffing Attack Surface
For any organization at risk for credential stuffing attacks, its ability to effectively mitigate these attacks will depend on more than the bot management vendor or solution you select. How your website is architected will play a critical role in the effectiveness of any security solution. 

To understand why, consider how these attacks work, and how security solutions protect against them. Credential stuffing attackers use botnets to automate the validation of stolen credentials against your application login. To separate automated bots from legitimate human users, today’s advanced bot detection technologies use JavaScript injection when protecting web pages and a mobile software development kit (SDK) when protecting APIs used by native mobile apps. Depending on how your website is architected and the types of clients that interact with it, your ability to minimize your attack surface could be limited. 

In this white paper, we explain what’s behind the architectural challenge to employing today’s bot management solutions effectively, the ideal website architecture to mitigate credential stuffing attacks successfully, and specific intermediate options to reduce your attack surface — along with the risks and limitations of each option.
Ved download af dette whitepaper accepterer du, at leverandøren af whitepaperet kontakter dig på din oplyste e-mailadresse eller telefonnummer med yderligere information om leverandørens ydelser relateret til whitepaperet
Udgivelsesdatoen: 01-07-2020
Filtype: pdf
Dokument: Whitepaper
Sprog: EN
Udgivet af: Akamai Technologies

Også interessant