Question: To establish a session with a web application, a secret ( for example, a cookie or token ) is passed to the client system as

To establish a session with a web application, a secret (for example, a cookie or token) is passed to the client system as a unique identifier, typically associated with the user entity. Subsequent interactions with that site will use the secret to resume this established session, optimizing the users experience and streamlining the number of necessary overhead transactions. The session secret is often targeted by bad actors seeking to gain unauthorized access to personal data and achieve financial gain. To prepare for this discussion, review the references below, paying close attention to best practice recommendations for session management.
Review these resources:
Session Management Cheat Sheet Links to an external site.
NIST Session Management Links to an external site.
For your post, address the following regarding session management:
What are the most important session management best practices? Why?
Choose one of the session attack scenarios below. Outline 34 session management strategies that would mitigate the risk of such an attack.
Scenario 1. A college student logs into his or her bank account using a kiosk at a package shipping store. After the student departs, a bad actor logs into the same system, launches a browser and is able to resume the students banking session.
Scenario 2. An attacker has collected hundreds of authenticated session ID values used by a mobile health (mhealth) application to identify authenticated users. After deciphering the structure of the mhealth app session ID, the attacker was able to generate and test different values of session IDs until they successfully gained access to the application.
Scenario 3. A system administrator connects to a critical server via remote desktop services to perform routine maintenance. He closes the RDP session by clicking the X in the right-hand corner of the window, inadvertently allowing the session to stay active on the remote server for an indeterminate amount of time.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!