CJRS and Sidejacking: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Remove surplus text.)
 
imported>Doug Williamson
(Create page. Source: The Treasurer, December 2018 / January 2019, p31.)
 
Line 1: Line 1:
''COVID-19 - business continuity - UK.''
''Cybersecurity - cyber attacks.''


The former UK Coronavirus Job Retention Scheme.
Sidejacking is a form of cyber attack in which an attacker steals a session cookie from a legitimate website visited by a legitimate client.


These cookies often contain usernames and passwords, and are generally sent back unencrypted, even if the original log-in was protected via https.


==See also==
The session cookie is then used to gain unauthorised access to systems.
*[[Coronavirus Job Retention Scheme]]
*[[COVID-19]]
*[[COVID-19 Corporate Financing Facility]]
*[[Furlough]]
*[[Her Majesty’s Revenue & Customs]]
*[[Self-Employment Income Support Scheme]]




==Resources for COVID-19==
==See also==
[https://www.treasurers.org/hub/technical/covid19 ACT technical - COVID-19]
*[[CEO fraud]]
 
*[[Cyber attack]]
[https://www.gov.uk/government/publications/guidance-to-employers-and-businesses-about-covid-19/covid-19-support-for-businesses UK government: support for businesses]
*[[Cybercrime – A Threat And An Opportunity]]
 
*[[Cyber security: protecting your business and your clients]]
[https://www.gov.uk/coronavirus UK government: COVID-19 support hub]
*[[Cybersecurity]]
*[[DDoS]]
*[[Hotspot sniffing]]
*[[Man in the middle]]
*[[National Cyber Security Centre]]
*[[Social engineering]]


[[Category:Accounting,_tax_and_regulation]]
[[Category:Identify_and_assess_risks]]
[[Category:The_business_context]]
[[Category:Technology]]

Revision as of 21:56, 3 February 2019

Cybersecurity - cyber attacks.

Sidejacking is a form of cyber attack in which an attacker steals a session cookie from a legitimate website visited by a legitimate client.

These cookies often contain usernames and passwords, and are generally sent back unencrypted, even if the original log-in was protected via https.

The session cookie is then used to gain unauthorised access to systems.


See also