Briefly describe the common web application security

Assignment Help Computer Network Security
Reference no: EM132972477

Assessment Task 1: Knowledge Questions

Q1. Explain in at least one sentence the following components / technologies of web application and web server:
1. HTTP Server (for example Apache)
2. Database Server (for example MySql)
3. Backend (Server side) scripting (for example PHP)
4. Operating system (for example Windows, Linux)
5. DNS server
6. Web Firewall operations/configurations
• Block by default
• Allow specific traffic
• Specify source IP addresses
• Specify the destination IP address
• Specify the destination port

Q2. The following picture is an HTTP request from a client to a web server. Answer the following questions about the HTTP protocol

1. What is the web server domain name we are trying to connect to?

2. What is the web browser the user is using?

3. What is the specific web page the user is trying to open (full path + file name is required)?

4. What is the web protocol used? (including version of the protocol)

5. Identify the HTTP operation in this request.

Q3. What is the default port number for HTTP?
What is the default port number for HTTPS?

Q4. With you understanding of DNS server, explain in at least a paragraph how the web browser determines which IP address will resolve the domain name "google.com" when this is queried.

Q5. Explain in at least at least a paragraph the process of "TCP/IP Encapsulation and Decapsulation"

Q6. Explain OSI 7-layer model. List all 7 layers and explain in at least a paragraph of each of them.

Q7. Map the following internet protocols to the correct layer of the OSI 7-layer model

Q8. In IT terms, what is the primary function of a firewall? Describe three features and three operations?

Q9. You currently have a basic firewall that only understands IP addresses and port numbers but you need extra protection for your company web server (run over HTTP).

What is the OSI layer your firewall must operate at to understand HTTP traffic?

Q10. Use the OWASP framework to identify common software and web security vulnerabilities. Search for the "Top Ten Project" on the OWASP website and answer the following questions
1. Which is the latest version of "Top Ten". Identify the name?
2. What is the link to the latest "Top Ten" PDF document?
3. List the names of the ten risks below.

Q11. Briefly describe the following common Web application security risks and vulnerabilities based on the OWASP framework:
• A1:2017- Injection
• A2:2017-Broken Authentication
• A3:2017- Sensitive Data Exposure
• A4:2017-XML External Entities (XXE)
• A5:2017-Broken Access Control

Q12. What is the tool DIRB (Directory Buster) used for?

Q13. What is the tool Nikto used for?

Q14. What is the tool "nmap" used for?

Q15. What is the tool Burp Suite used for? Explain at least 3 tools embedded in Burp Suite.

Q16. About the term AAA, match the correct term with its description.

The process of granting or denying a user access to resources Authentication

Accounting

Authorisation
The process of keeping track of a user's activity while accessing the network resources Authentication

Accounting

Authorisation
The process of identifying an individual Authentication

Accounting

Authorisation

Q17. Explain in at least one sentence what web application server architecture is and list two web application components?

Attachment:- Expose website security vulnerabilities.rar

Reference no: EM132972477

Questions Cloud

Show journal entries to transfer the amounts to land account : Show journal entries to transfer the amounts to three different accounts, i.e. Land account, Buildings account and Machinery account.
Describe fundamental phases of the penetration testing : Describe the fundamental phases of the Penetration Testing Execution Standard and Explain any legal implications that may arise from exceeding the scope
Compute the value of deferred tax asset and liabilities : Warranties expenditures are deductible when paid. The company's effective tax rate is 25%. Compute the value of deferred tax asset and liabilities
What entry should the partnership record for partner a : Find what entry should the partnership record? Partner A has a capital of $444,000, and a Partner B has $327,000, when partner B sells the partnership interest.
Briefly describe the common web application security : Briefly describe the common Web application security risks and vulnerabilities based on the OWASP framework
How many chairs should Cari produce in December : Finished goods inventory at the end of November was 4,000 units. How many chairs should Cari produce in December
Which will helena have a chance to access assets of harry : Harry passed away last week and left his entire estate to Felicia. Which will Helena have a chance to access the assets of Harry's estate?
Calculate the cost of equity capital applicable to ABC : The long term interest rate on Indian Government Bonds is currently at 5.5 %. Calculate the cost of equity capital applicable to ABC
Which of statement about lucas actions correct for peyton : Lucas realizes that the questions are beyond his scope of expertise, Which of the statements about Lucas' actions is CORRECT?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a program that takes a shift value and a plaintext

Write a program that takes a shift value between +/- 26 and a plaintext message (no spaces) and returns the corresponding ciphertext.

  Provide input to thoroughly test the dfa

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol.

  Describe how bob can recover the message

Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

  Name and describe the four major access control models

War driving is a wireless attack. Describe at least four war driving tools and the purpose of each. Name and describe the four major access control models, and list the restrictions for each.

  Benefits of having a computer security

In your report, discuss the benefits of having a computer security incident response team within your enterprise. Also discuss the major steps involved in responding to a system security incident. Support your report with real-life examples.

  What is executable space protection

What is a buffer overflow attack, and what can be done to prevent them? Consider this question in terms of both the application and the hardware architecture/system itself.

  How vulnerable end-users are leaving themselves

Students must NOT include any audio or video files. The PowerPoint virtual presentation will not be formally presented. As a result students must endeavour to convey their views and research findings whilst adhering to best presentation practices.

  What do you understand by cryptography

"Monitoring the employees in an organization is legal" Debate on this statement from the perspective of Employer and Employee.

  Present the project to the board of directors

Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quali..

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  The designers of s-aes got the ciphertext

Use the key 1010 0111 0011 1011 to encrypt the plaintext "ok" as expressed in ASCIIas 0110 1111 0110 1011. The designers of S-AES got the ciphertext 0000 0111 00111000. Do you?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd