+1-316-444-1378

 

“Session Hijacking” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:

  • Consider the What if case in Chapter 1 from the Book: Web Applications and Data Servers and respond to one or more of the questions asked.
  • Research the web, and discuss any recent story concerning session hijacking. Provide summary and discussion on what might have been done to prevent such hijacking, or how such hijacking can be recognized. For citing Internet sources in your discussion, please see the Web Sources section of the Strayer Writing Standards guide available in the left-hand menu.
  • Any current topic or article related to penetration techniques.
  • The instructor insight.