Aim higher college central information technology

Assignment Help Basic Computer Science
Reference no: EM133295389

Defense against web attacks is critical in a security professional's skill set. Your manager has asked you to review Aim Higher College's Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what protection you would recommend, and why.

1. Aim Higher College has deployed an open-source blog package. This package uses a database backend and allows users to create user IDs, sites, and content to post it. Recently, the service has had off-campus users who have posted links that appear to be directed toward university resources but are getting redirected toward off-campus malware sites. What would you recommend that the application administrator should do?

2. A developer for Aim Higher College is creating a Web server form for submitting calendar events to the College's event calendar. What protective measures would you suggest to ensure its security?

3. Database administrators from Aim Higher College's central Information Technology (IT) group have contacted the security team, noting that they are finding odd entries in a Web application's backend database. Some entries appear to be SQL commands such as "UNION" and "JOIN," which cause them to think that an attacker is probing the Web application. What recommendations would you provide to protect the application and the backend database?

4. A scan of Aim Higher College's primary Web server using a Nikto shows many default configuration files and sample files on many older servers. What is wrong with this, and what should be done about it?

Reference no: EM133295389

Questions Cloud

Describe the proposal of the judgement : You can use your judgment as to how you want to organize the proposal but at minimum, your proposal should include the three components described above.
Implementing dual-write by using virtual entities : A company uses Dynamics 365 Finance. The company is implementing dual-write by using virtual entities.
Prepare and produce a country demographic : BIO4503 Applied Epidemiology - Middlesex University London prepare and produce a Country Demographic and Epidemiological Profile of the country assigned
Subtract sequential restoring divider for unsigned integers : Develop an RTL VHDL description of the Shift/subtract sequential restoring divider for unsigned integers.
Aim higher college central information technology : Database administrators from Aim Higher College's central Information Technology (IT) group have contacted the security team, n
What is the problem of the legal and NGT pays : The problem here is that if the fee is legal and NGT pays it, it might still be viewed as reputationally damaging in the United States-NGT's largest market
Company achieve competitive advantage in industry : Critically evaluate how the information systems would help the company achieve competitive advantage in the industry.
Sampling and strengthens generalizability of findings : Describe one method that removes bias from sampling and strengthens the generalizability of findings.
What rule is applicable for the onatrio statutory limitation : What rule is applicable to this Case study: Common Law liability rule or the Ontario Statutory Limitation? how much would you pay the guest for his loss?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain formal ethical problem-solving methodology

Describe an event in which you made an individual ethical decision. What was the impact on your decision. explain a formal ethical problem-solving methodology.

  Create a graduationcandidate class

The class includes appropriate functions to set and display all the fields. When you display a GraduationCandidate, include a decision as to whether the GraduationCandidate can graduate. Create a main()function that instantiates several Graduation..

  Applying for state or federal programs

Are some other options available to an individual, besides applying for state or federal programs?

  List the two sources of inflation

List the two sources of Inflation and B) how each affect either Aggregate Supply or Aggregate Demand

  Determine into which of ten chains to put the value

Store the values in a hash table that uses the hash function key % 10 to determine into which of ten chains to put the value.

  Notable feature of Linux

A notable feature of Linux is its ability to accept new device drivers on the fly, while the system is up and running. How is this a useful function?

  Types of control structures

There are many types of control structures. Why are control structures important? Are control structures universal to all programming languages? Why?

  List uses that this type of computer could support

List uses that this type of computer could support for whichever division selected from above.Explain why you think the impact will or will not occur, cite sources when necessary, and justify your position using APA format.

  Organizing shared information

Information architecture can be simply defined as organizing shared information. There are many different ways to organize web sites

  The demand curve for a monopolist

Suppose the The demand curve for a monopolist is QD = 47,000 -50 P, and the marginal revenue function is MR = 940 - 0.04Q. The monopolist

  Airbus parts supply chain

1. What are potential problems with using RFID tags throughout Airbus's parts supply chain?

  Business processes as services can improve efficiency

how business processes as services can improve efficiency

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd