Sensitive Data Exposure

 





Passwords are hashed using Argon2 before storing them in the database. This is a hard memory password hashing function that not only makes it computationally expensive, but also uses a lot of memory. This means that it is much more difficult to attack Argon2 hashes using graphics processors or special equipment



Confidential information should not be stored in plain text, which is not a secure way to store confidential data. An attacker gaining access to the database can easily obtain sensitive information.

It is recommended to use community-approved and strong encryption algorithms for storing sensitive data. In this case, the AES encryption algorithm with GCM mode and a key length of 256 bits is used. Such encryption will help to avoid data leakage if an attacker gains access to the storage.





This happens when there is no SSL certificate in place and as a result sensitive data such as passwords are sent in plain text.  This is under risk of being captured by an eavesdropping attacker.

Using an insecure protocol to transport login credentials would allow an attacker to gain access to this information and impersonate the legitimate user.
It’s recommended to use secure protocols to transport user credentials. Using HTTPS to transport user data over the network prevents sensitive information from being exploited by a sniffing attack. Also, using the POST request method is a better approach for submitting login credentials since it sends data inside the request body instead of exposing it in the URL.







Comments

Popular posts from this blog

Microservices and Service-Oriented Architecture

Version control and Continuous Integration/Continuous Deployment (CI/CD)

Delegates