Background
Business logic abuse is a subtle form of abuse – often perpetrated on websites. Traditionally, bad actors have exploited websites by breaking into the security infrastructure of the website (the firewall or VPN). Other attacks involve finding errors in the software of the website to break into the website. Because websites and other software vendors have gotten better at hardening their security infrastructure and identifying software errors, online criminals have gotten more sophisticated in their attacks. In the next level of attack – attacking the business logic of the website – the bad guy uses the legitimate pages of the website to perpetrate his or her fraud.
Business logic abuse results from the perpetrator discovering a flaw in the business logic and exploiting that for illicit gain.
Read more about this topic: Business Logic Abuse
Famous quotes containing the word background:
“Silence is the universal refuge, the sequel to all dull discourses and all foolish acts, a balm to our every chagrin, as welcome after satiety as after disappointment; that background which the painter may not daub, be he master or bungler, and which, however awkward a figure we may have made in the foreground, remains ever our inviolable asylum, where no indignity can assail, no personality can disturb us.”
—Henry David Thoreau (18171862)
“In the true sense ones native land, with its background of tradition, early impressions, reminiscences and other things dear to one, is not enough to make sensitive human beings feel at home.”
—Emma Goldman (18691940)
“... every experience in life enriches ones background and should teach valuable lessons.”
—Mary Barnett Gilson (1877?)