What is the same policy of origin?

The principles of the same origin (SOP) is a security device for certain types of browser applications on the Internet. When using a computer on an extensive network, such as the Internet, it is possible to drastically increase the suffering of the attack of hackers and other harmful entities compared to working on smaller isolated networks. The principles of the same origin act to verify the scripts running on the website and prevent hackers from creating a computer connection under fraudulent parameters. Scripts are simply programs or applications that the site needs to operate.

When connecting to the site, connects via "ports" on the computer. The name is quite descriptive; The ports are either open or closed depending on the circumstances, and only open ports are susceptible to attack. When the site requires a specific connection to the port to the computer, it exposes the computer to the risk level. As long as the port remains open, other individuals and programs can be "connected" to the computer vulnerability. OthersIndividuals and programs can also try to pose as a site and ask the computer to open other ports.

6 The site must constantly "prove" that it is who and what he says is to prevent others from jumping and using an open connection on the computer. The principles of the same origin allow the scripts to operate only if they come from the intended site, satisfy the "questions" that the SOP asked.

To verify this, the principles of the same origin check three things: domain name, application layer protocol and specific document port numbers or websites running by script. The name of the domain is a specific nameweb. It is usually preceded by a prefix “www”. The application layer protocol is the connection method; For example, the Hypertext Transfer Protocol (HTTP) or file transmission protocol (FTP). Finally, the port number is a specific port number through which the connection takes place. If these three things are checked, the script is running; HerNak SOP prevents operation.

as well as anything about computers, SOP is not infallible. Some types of hacker attacks, such as rebinding the domain name and proxy server, allow you to introduce a fraudulent site as legitimate. Therefore, SOP should be considered one line of defense against the threats online.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?