diff --git "a/stack_exchange/IS/Information Security 2021.csv" "b/stack_exchange/IS/Information Security 2021.csv" new file mode 100644--- /dev/null +++ "b/stack_exchange/IS/Information Security 2021.csv" @@ -0,0 +1,40661 @@ +Id,PostTypeId,AcceptedAnswerId,ParentId,CreationDate,DeletionDate,Score,ViewCount,Body,OwnerUserId,OwnerDisplayName,LastEditorUserId,LastEditorDisplayName,LastEditDate,LastActivityDate,Title,Tags,AnswerCount,CommentCount,FavoriteCount,ClosedDate,CommunityOwnedDate,ContentLicense +242786,1,,,1/1/2021 6:50,,1,121,"

is there any way to have a good effort time estimation of a Threat Modeling and Risk Assessment activity for an internal infrastructure (about 30 active nodes)?

+

In general, is it possible to find a "best practice" to estimate effort time for an activity that detects threats by using Threat Modelling and estimate the risk of threats by following a standard template, such as OWASP Risk Rating score?

+

Or, according to your experience, is it better to have a "time material" approach for this type of activities?
+Thank you in advance

+",248269,,,,,1/1/2021 6:50,Threat Modeling and Risk Assessment Effort Estimation,,0,3,,1/2/2021 8:48,,CC BY-SA 4.0 +242787,1,242792,,1/1/2021 13:12,,76,10609,"

In many services, email can be used to reset the password, or do something that is sensitive. Sensitive data is also quite often sent to you by email, e.g. long links that enable access to your account or similar.

+

However for most people, their email service provider can read all their emails, can see what is being sent, and can send email themselves as "you". So doesn't that give your email service provider basically full access to your accounts? This seems like the incorrect medium to send such information via.

+

I don't really know if this matters, however you never really see these email services sending you "encrypted" email with your pgp key.

+

Also, it is well known that email is inherently insecure, or not designed with privacy or security in mind.

+

However it keeps being used for these purposes.

+",248276,,143777,,1/4/2021 15:45,1/4/2021 15:45,Why is email often used as the ultimate verification?,,8,13,10,,,CC BY-SA 4.0 +242788,1,,,1/1/2021 13:23,,0,18,"

I want to create a minimal example where JavaScript injection/XSS is working. This is my example server:

+ +
const express = require("express");
+const path = require("path");
+
+const app = express();
+const port = 3000;
+
+app.get("/", (req, res) => {
+  res.sendFile(path.join(__dirname + "/index.html"));
+});
+
+app.get("/api/comments", (req, res) => {
+  res.json(["Comment A", "Comment B<script>console.log('Hello')</script>"]);
+});
+
+app.listen(port, () => {
+  console.log(`Example app listening at http://localhost:${port}`);
+});
+
+

The browser should execute the script inside Comment B. This is my index.html:

+ +
<!DOCTYPE html>
+<html>
+  <head>
+    <meta charset="UTF-8" />
+  </head>
+  <body>
+    <h1>Comments</h1>
+    <ul id="comments"></ul>
+    <script>
+      fetch("http://localhost:3000/api/comments")
+        .then((response) => response.json())
+        .then((data) => renderComments(data));
+
+      function renderComments(comments) {
+        let commentHTML = "";
+        for (const comment of comments) {
+          commentHTML += `<li>${comment}</li>`;
+        }
+        document.getElementById("comments").innerHTML = commentHTML;
+      }
+    </script>
+  </body>
+</html>
+
+

I can see the script tag with the inspector in the browser however it isn't executed. Nothing is logged into the console. It doesn't work either with alert or fetch. What is missing to get the browser to execute the script inside the comment?

+

+",248275,,,,,1/1/2021 13:23,JavaScript injection minimal example using node/express not working: