{"id":386,"date":"2019-10-14T13:40:00","date_gmt":"2019-10-14T13:40:00","guid":{"rendered":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/?p=386"},"modified":"2020-05-25T14:03:58","modified_gmt":"2020-05-25T14:03:58","slug":"lets-talk-about-security-digital-identity","status":"publish","type":"post","link":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/","title":{"rendered":"Let&#8217;s Talk About Security \u2013 Digital Identity"},"content":{"rendered":"\n<p>Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet. It is therefore theoretically possible for a client to address every server connected to the internet. Transposed to the real world, you could say that every building is located somewhere in the world and could be entered by anyone unless there are security precautions in place. Such security precautions to prevent unauthorized access also exist on the internet.<\/p>\n\n\n\n<p>I was very naive when I first approached this issue, thinking a login screen would suffice when programming a website. That would lock out anyone except the users whom I had previously granted access to the website. But then I was confronted with man-in-the-middle and DoS attacks and certificates. Luckily, there are organizations like <a rel=\"noreferrer noopener\" href=\"https:\/\/www.owasp.org\/index.php\/Main_Page\" target=\"_blank\">OWASP<\/a> (Open Web Application Security Project) that have made it their mission to improve security in the World Wide Web. For this purpose, they provide free information, tools and methods that anyone can use to learn the basics. The OWASP website contains a list of the top 10 security vulnerabilities that occur in many current applications. The website explains these vulnerabilities and measures that can be taken to eliminate them as far as possible. The list ranges from SQL injections and insecure authentication to file uploads.<\/p>\n\n\n\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" src=\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1-600x400.jpg\" alt=\"Mouse pointer on the word Security\" class=\"wp-image-487\"\/><figcaption><em>Figure 1: Let&#8217;s Talk About Security<\/em><\/figcaption><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In order to illustrate the vulnerabilities and possible security precautions, I am going to follow the developer Sebastian Safe as he programs his website. Metalworkers who offer locksmith services can register their business on this website. Sebastian created the basic website and is now dealing with the authentication of the users, i.e the digital identity. The problem is proving that the person who wants to use the system really is the person authorized to do so. For this purpose, he uses a session manager that verifies the user session so that the user is not forced to log in again and again while they are working in the system. The <a rel=\"noreferrer noopener\" href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html\" target=\"_blank\">NIST<\/a> (National Institute of Standards and Technology) also issued a standard (NIST 800-63b) that provides a guideline for the user as they set up a digital identity. Sebastian created a login screen for authentication that is to be used both to register and to log in to the system. To protect Sebastian\u2019s website from getting hacked, let me mention a few crucial points that should be observed when it comes to authentication and that are important from the point of view of QA.<\/p>\n\n\n\n<p>The simplest example of authentication that you can find is a simple password. Sebastian stores the simple password generated by the user in his system, and verifies it when the user wants to log in. It is common knowledge that passwords should preferably be complex to ensure that they cannot be easily determined with a brute-force approach. NIST offers several recommendations or guidelines that should be observed to ensure that passwords are secure. A password should, for example, consist of at least 8, preferably even 12 characters because the number of variations to be tried in a brute-force approach increases exponentially with every character. Furthermore, it is recommended not to use standard words, even if special characters are inserted. For example, if you write the word \u201cPassword\u201d as \u201cPa\u00a7\u00a7w0r1\u201d, most brute-force algorithms will quickly recognize such a construct. Special characters are no longer as efficient as they used to be because the methods to decrypt passwords include all the special characters. It is therefore recommended to use long, cryptic passphrases to create a secure password.<\/p>\n\n\n\n<p>More important at this point, however, is the storage of the passwords in Sebastian\u2019s system. With smaller applications, the passwords can be stored in JSON files, but our developer is planning to create a larger and more extensive application. Consequently, as the structures in this case are more complex, the passwords are stored in a database. Sebastian does not know all that much about security; therefore, he stores the passwords in his database without encryption. He believes that no one can access his system anyway unless they are officially registered. However, the OWASP Top 10 vulnerabilities show that database leaks are one of the most common security vulnerabilities. Therefore, he should expect attackers to be able to access the database. As the login information of all the users of his website is stored there without encryption, an attacker could easily acquire it. This is why it is very important to store all passwords with encryption. There are several hash functions such as SHA256, WHIRLPOOL or TIGER2 that can be used for this purpose. These algorithms deliver a string of characters that cannot be decrypted with the knowledge we have today.<\/p>\n\n\n\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" src=\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_2-600x138.jpg\" alt=\"Part of code for character string for encryption\" class=\"wp-image-488\"\/><figcaption><em>Figure 2: Character string for encryption<\/em><\/figcaption><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This way, the passwords are safe even if they get stolen. Unfortunately, many of these algorithms are \u201ccracked\u201d more and more efficiently over time. Even if you cannot decrypt the hashes, it is possible to trace the passwords from the hashes by means of rainbow tables. Rainbow tables are lists of countless passwords that were encoded with the respective algorithm. Accordingly, it is possible to find the passwords based on the hash by means of such rainbow tables. This is an example of such a <a rel=\"noreferrer noopener\" href=\"http:\/\/project-rainbowcrack.com\/table.htm\" target=\"_blank\">rainbow Table<\/a>.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Example of how to trace a password:<\/p>\n\n\n\n<p>NTLM hash:   2b5cec7f00f89013efd8d2b0b5f6ac23<br>Decrypted Password:   NecoPasswort<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This is why choosing a secure algorithm for encryption is so important. With currently available methods, a password with 8 characters encrypted with the NTLM hash function can be cracked within minutes. To make tracing by means of rainbow tables more difficult, Sebastian has to take other precautions in addition to the encryption. In this case, he choses the SALT &amp; PEPPER option. A SALT string is added to the user\u2019s login password before it is hashed. This way, the password becomes more complex and cannot be decrypted with simple rainbow tables. It is recommended to generate a new SALT string for every user to obtain a greater variance. The disadvantage of a SALT is that it is stored in the database like the password hashes. They can be stored in different tables, but as soon as an attacker gains access to the database, they are able to read out the SALTs and use them to decrypt the passwords. Therefore, a PEPPER is added as a second layer of encryption. The PEPPER string works the same way as the SALT. A string is added before hashing the password in order to further complicate tracing. However, the PEPPER is not stored in the database, but hard-coded in the source code. This way, an attacker who only has access to the database cannot read out the PEPPER from the source code together with the hashes.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" src=\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_3-600x154.png\" alt=\"Example for code SALT &amp; PEPPER option\" class=\"wp-image-489\"\/><figcaption><em>Figure 3: Coding example of the SALT &amp; PEPPER option<\/em><\/figcaption><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Sebastian has now salted and peppered his password hashes. It is worth noting that this does not increase the security of the password itself. However, it hampers an attacker\u2019s attempt to decrypt the users\u2019 passwords by means of rainbow tables.<\/p>\n\n\n\n<p>Another way for Sebastian to protect the access to his website is using multi-factor authentication (MFA) for the login. MFA has already become very common nowadays: Microsoft Azure with its SMS code, banks and their chip TAN, or Google Authenticator. They all generate a code when a login is triggered. These codes are transmitted through a separate channel and therefore offer a very small target for someone trying to read out the codes. This way, Sebastian is doubly sure that only legitimate users are able to log in to his system. It may be possible to steal the passwords by means of SQL injections, but logging in would still be impossible as long as the attacker does not have the MFA code as well.<\/p>\n\n\n\n<p>From the QA point of view, it is important to determine how passwords are stored in a system, and to ask yourself the following questions:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Where are the passwords located?<\/li><li>Are they encrypted, and if so, how?<\/li><li>Are the hash functions used evident from metadata?<\/li><li>Are there any additional precautions to safeguard the passwords (MFA, SALT &amp; PEPPER)?<\/li><\/ul>\n\n\n\n<p>For self-testing, you can use <a rel=\"noreferrer noopener\" href=\"https:\/\/hashes.org\/gen.php\" target=\"_blank\">online hash generators<\/a> to encrypt passwords and then try to decrypt them by means of rainbow tables.<\/p>\n\n\n\n<p>This concludes the first part of my security talk. I hope I was able to give you some insight into what is important in password encryption.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.<\/p>\n","protected":false},"author":76,"featured_media":389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[7,8],"tags":[155,157,159,160,163,165,167,168,169,170,171,172],"topics":[81],"class_list":["post-386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-quality-assurance","category-web","tag-salt-pepper","tag-digital-identity","tag-bruteforce","tag-nist","tag-session-management","tag-mfa","tag-login-screen","tag-authentification","tag-database-leaks","tag-rainbow-tables","tag-multi-factor-authentification","tag-security-website","topics-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Let&#039;s Talk About Security \u2013 Digital Identity - ZEISS Digital Innovation Blog<\/title>\n<meta name=\"description\" content=\"Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Let&#039;s Talk About Security \u2013 Digital Identity - ZEISS Digital Innovation Blog\" \/>\n<meta property=\"og:description\" content=\"Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Innovation Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-14T13:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-25T14:03:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Neco Giedrojc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neco Giedrojc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/\",\"url\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/\",\"name\":\"Let's Talk About Security \u2013 Digital Identity - ZEISS Digital Innovation Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg\",\"datePublished\":\"2019-10-14T13:40:00+00:00\",\"dateModified\":\"2020-05-25T14:03:58+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#\/schema\/person\/52922d077aabdd8130bc2df264e0cf5b\"},\"description\":\"Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#primaryimage\",\"url\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg\",\"contentUrl\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Mauszeiger \u00fcber dem Wort Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Let&#8217;s Talk About Security \u2013 Digital Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#website\",\"url\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/\",\"name\":\"Digital Innovation Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#\/schema\/person\/52922d077aabdd8130bc2df264e0cf5b\",\"name\":\"Neco Giedrojc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-content\/uploads\/sites\/3\/2020\/05\/giedrojc_neco-150x150.jpg\",\"contentUrl\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-content\/uploads\/sites\/3\/2020\/05\/giedrojc_neco-150x150.jpg\",\"caption\":\"Neco Giedrojc\"},\"description\":\"Shortly after completing his degree in \\\"Computer Engineering\\\", Neco Giedrojc joined the test area of ZEISS Digital Innovation and works there as a tester. In his main project, he is currently dealing with the integration test of complex systems.\",\"url\":\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/author\/ennecogiedrojc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Let's Talk About Security \u2013 Digital Identity - ZEISS Digital Innovation Blog","description":"Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/","og_locale":"en_US","og_type":"article","og_title":"Let's Talk About Security \u2013 Digital Identity - ZEISS Digital Innovation Blog","og_description":"Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.","og_url":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/","og_site_name":"Digital Innovation Blog","article_published_time":"2019-10-14T13:40:00+00:00","article_modified_time":"2020-05-25T14:03:58+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg","type":"image\/jpeg"}],"author":"Neco Giedrojc","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Neco Giedrojc","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/","url":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/","name":"Let's Talk About Security \u2013 Digital Identity - ZEISS Digital Innovation Blog","isPartOf":{"@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#primaryimage"},"image":{"@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg","datePublished":"2019-10-14T13:40:00+00:00","dateModified":"2020-05-25T14:03:58+00:00","author":{"@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#\/schema\/person\/52922d077aabdd8130bc2df264e0cf5b"},"description":"Security is more important today than ever before. Virtually everything is digitized and either located in its own network or connected to the internet.","breadcrumb":{"@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#primaryimage","url":"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg","contentUrl":"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1.jpg","width":1920,"height":1280,"caption":"Mauszeiger \u00fcber dem Wort Security"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/lets-talk-about-security-digital-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/"},{"@type":"ListItem","position":2,"name":"Let&#8217;s Talk About Security \u2013 Digital Identity"}]},{"@type":"WebSite","@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#website","url":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/","name":"Digital Innovation Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#\/schema\/person\/52922d077aabdd8130bc2df264e0cf5b","name":"Neco Giedrojc","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/#\/schema\/person\/image\/","url":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-content\/uploads\/sites\/3\/2020\/05\/giedrojc_neco-150x150.jpg","contentUrl":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-content\/uploads\/sites\/3\/2020\/05\/giedrojc_neco-150x150.jpg","caption":"Neco Giedrojc"},"description":"Shortly after completing his degree in \"Computer Engineering\", Neco Giedrojc joined the test area of ZEISS Digital Innovation and works there as a tester. In his main project, he is currently dealing with the integration test of complex systems.","url":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/author\/ennecogiedrojc\/"}]}},"author_meta":{"display_name":"Neco Giedrojc","author_link":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/author\/ennecogiedrojc\/"},"featured_img":"https:\/\/blogs.zeiss.com\/digital-innovation\/de\/wp-content\/uploads\/sites\/2\/2020\/05\/201910_Security_Digital_Identity_1-600x400.jpg","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/quality-assurance\/\" class=\"advgb-post-tax-term\">Quality Assurance<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">Web<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Quality Assurance<\/span>","<span class=\"advgb-post-tax-term\">Web<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">Salt &amp; Pepper<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">Digital Identity<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">Bruteforce<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">NIST<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">Session Management<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">MFA<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">login screen<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">authentification<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">database leaks<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">rainbow tables<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">multi factor authentification<\/a>","<a href=\"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/category\/web\/\" class=\"advgb-post-tax-term\">security website<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Salt &amp; Pepper<\/span>","<span class=\"advgb-post-tax-term\">Digital Identity<\/span>","<span class=\"advgb-post-tax-term\">Bruteforce<\/span>","<span class=\"advgb-post-tax-term\">NIST<\/span>","<span class=\"advgb-post-tax-term\">Session Management<\/span>","<span class=\"advgb-post-tax-term\">MFA<\/span>","<span class=\"advgb-post-tax-term\">login screen<\/span>","<span class=\"advgb-post-tax-term\">authentification<\/span>","<span class=\"advgb-post-tax-term\">database leaks<\/span>","<span class=\"advgb-post-tax-term\">rainbow tables<\/span>","<span class=\"advgb-post-tax-term\">multi factor authentification<\/span>","<span class=\"advgb-post-tax-term\">security website<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 7 years ago","modified":"Updated 6 years ago"},"absolute_dates":{"created":"Posted on October 14, 2019","modified":"Updated on May 25, 2020"},"absolute_dates_time":{"created":"Posted on October 14, 2019 1:40 pm","modified":"Updated on May 25, 2020 2:03 pm"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/posts\/386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":6,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"predecessor-version":[{"id":422,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/posts\/386\/revisions\/422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/media\/389"}],"wp:attachment":[{"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/tags?post=386"},{"taxonomy":"topics","embeddable":true,"href":"https:\/\/blogs.zeiss.com\/digital-innovation\/en\/wp-json\/wp\/v2\/topics?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}