![]() ![]() ![]() Version 1 of the standard was published in 2012 as W3C candidate recommendation and quickly with further versions (Level 2) published in 2014. The standard, originally named Content Restrictions, was proposed by Robert Hansen in 2004, first implemented in Firefox 4 and quickly picked up by other browsers. CSP provides a standard method for website owners to declare approved origins of content that browsers should be allowed to load on that website-covered types are JavaScript, CSS, HTML frames, web workers, fonts, images, embeddable objects such as Java applets, ActiveX, audio and video files, and other HTML5 features. It is a Candidate Recommendation of the W3C working group on Web Application Security, widely supported by modern web browsers. ![]() Computer security standard to prevent cross-site scripting and related attacksĬontent Security Policy ( CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection attacks resulting from execution of malicious content in the trusted web page context. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |