MEL: Security

cg.contactjones.baraza@cgmel.orgen_US
cg.contributor.centerInternational Center for Agricultural Research in the Dry Areas - ICARDAen_US
cg.contributor.centerInternational Institute of Tropical Agriculture - IITAen_US
cg.contributor.centerInternational Livestock Research Institute - ILRIen_US
cg.contributor.centerInternational Potato Center - CIPen_US
cg.contributor.centerCGIAR Research Program on Roots, Tubers and Bananas - RTBen_US
cg.contributor.centerWorldFish - WorldFishen_US
cg.contributor.centerCodeObia - CodeObiaen_US
cg.contributor.centerCGIAR Research Program on Livestock Agri-Food Systems - Livestocken_US
cg.contributor.centerSeed Companies (GLDC)en_US
cg.contributor.crpCGIAR Research Program on Fish Agri-Food Systems - FISHen_US
cg.contributor.funderCGIAR System Organization - CGIARen_US
cg.contributor.project-lead-instituteWorldFish - WorldFishen_US
cg.date.embargo-end-dateTimelessen_US
dc.creatorBaraza, Jonesen_US
dc.date.accessioned2020-01-22T11:00:58Z
dc.date.available2020-01-22T11:00:58Z
dc.description.abstractThe team explored aspects of security loopholes and solutions associated with MEL platform, and with third party integrations. Among the top security risks were: (a) zend1 known vulnerabilities: ZendMail lead to remote code execution (MEL not using ZendMail), (b) Over-Reliance on JavaScript - MEL will not be usable if JavaScript is disabled, (c) no server-side validation.en_US
dc.formatPDFen_US
dc.identifierhttps://mel.cgiar.org/dspace/limiteden_US
dc.identifier.citationJones Baraza. (4/12/2019). MEL: Security.en_US
dc.identifier.statusTimeless limited accessen_US
dc.identifier.urihttps://hdl.handle.net/20.500.11766/10610
dc.languageenen_US
dc.subjectmelen_US
dc.subjectmel platformen_US
dc.subjectmel developersen_US
dc.subjectsecurityen_US
dc.subjectonline securityen_US
dc.titleMEL: Securityen_US
dc.typePresentationen_US
dcterms.available2019-12-04en_US

Files