Assignment on software vulnerability

Assignment Help Computer Network Security
Reference no: EM13861750

Assignment on Software Vulnerability Software vulnerabilities, especially vulnerabilities in code, are a major security problem today. Not all bug or flaws in software become security vulnerabilities, but some of them do. An attacker can exploit these vulnerabilities to cause major disruption to a business.

An exploit can result in a variety of damages including crash of a system, taking the role of a super user, deleting of information in a file or an entire file, changing critical content in a database or a file, stealing valuable proprietary information, planting of malware, turning a system into a bot so to launch attacks on other systems.

Common software code vulnerabilities include: Buffer overflow Logic error or logic bombs Race conditions Format string vulnerability Cross-site scripting Cross-site request forgery SQL and other command injection Memory leak Incomplete mediation Integer overflow, underflow, and sign conversion errors Insufficient data validation The name of vulnerability and the name of an attack that exploits it are often called by the same name.

For example, the attack that exploits the buffer overflow vulnerability is known as the buffer overflow attack. Similarly, a race-condition attack leverages a race condition vulnerability.

An attacker can and have exploited more than one vulnerability in the same attack to cause more damage than would be possible with a single vulnerability.

Two organizations focus on improving software security and thus track the various vulnerabilities on a continual basis.

They are (1) Common Weakness Enumeration (CWE) by SANS/Mitre HYPERLINK "https://cwe.mitre.org/index.html" https://cwe.mitre.org/index.html), and (2) The Open Web Application Security Project (OWASP) (see HYPERLINK "https://www.owasp.org/index.php/About_OWASP" https://www.owasp.org/index.php/About_OWASP ).

I am attaching two documents here two documents, CWE Top 25 and OWASP Top 10. Please note the vulnerabilities or the type of vulnerabilities are not the same in these two lists.

This is because, OWASP's focuses only on web applications. Also, the two lists are also not exactly the same as the above bulleted list. They do, however, overlap.

In this exercise, you will investigate two vulnerabilities of your choice from these two lists or any other reputable source. For each of the two vulnerabilities you have chosen, you will explain the vulnerability including where it occurs (e.g., C language, database, web browser, etc.), and an example attack that exploited it.

You will also describe how the vulnerability can be minimized, prevented or mitigated. All the description should be in your own words. You may use code excerpt to illustrate the vulnerability or remove the flaw that is the source of the vulnerability. Your report should not be more than two pages long (double-spaced) for each vulnerability.

You need to consult at least two references for each vulnerability. If you have a good C/C++ programming background, you may want to explore the following site: HYPERLINK "https://www.cis.syr.edu/~wedu/seed/labs.html" https://www.cis.syr.edu/~wedu/seed/labs.html (See Software Security and Web Security Labs.)

There is an in-depth technical description and even a video class room presentation on many of these vulnerabilities, and how to exploit them and mitigate them in a lab setting.

Feel free to try the one or more of these laboratory exercises using the Ubuntu VM you can download from the site, but you are on your own.

I would certainly like to hear about your experience if you have actually tried one or more of these lab exercises.

Reference no: EM13861750

Questions Cloud

Design addresses the values of the organization : Completely redesign the IBM LOGO Use word, PowerPoint,or any application. The logo should represent the values of the organization. Using PowerPoint to create a presentation to sell your logo.
Write paper a about condition monitoring for solar cells : Write a research paper about CONDITION MONITORING FOR THE LIFE CYCLE OF SOLAR CELLS. Analyse the data available (past researches) and use it to create the preliminary report or background/introduction.
Increase in the supply of reserves in the banking system : Which of the following is a rate that should theoretically serve as a floor for the Fed funds rate? A dealer is said to be running a "matched book" if. An increase in the supply of reserves in the banking system leads to an increase in the Fed funds ..
Evaluation of what they eat an example of ethnocentrism : How is your evaluation of what they eat an example of ethnocentrism? What about your cultural practices makes those food seem weird? How can you look at what they eat in a more culturally relative way
Assignment on software vulnerability : Assignment on Software Vulnerability - Software vulnerabilities, especially vulnerabilities in code, are a major security problem today - Investigate two vulnerabilities of your choice from these two lists or any other reputable source
Price elasticity of demand : If the price elasticity of demand is E = -1/2, a 10% increase in the price will
Any example of irrational behavior by consumers : Economists assume that consumers attempt to maximize their utility based upon their preferences, income and price of commodities. do you see any weakness of the above are you aware of any example of irrational behavior by consumers(or yourself )?
Advantages and disadvantages of using teams at holden? : What are the advantages and disadvantages of using teams at Holden?
Analysis of the financial crisis in greece : Which sociological concepts can you apply to your analysis of the financial crisis in Greece? How best can you explain the problem and the solution- if any- in sociological terms

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd