Checking risk-vulnerability factors of web application

Assignment Help Basic Computer Science
Reference no: EM13829549

Problem:

The company CEO learned that input validation of user entered data to Order Entry Internet web application is one major security risk that the company must address comprehensively and thoroughly. He asked you, as the resident security expert, to propose several techniques to protect against and secure user input to the Order Entry Internet web application.

Download the vulnerability scanner application from this website https://www.acunetix.com/vulnerability-scanner/download/

After installing it evaluate its features and answer in a Word document the following:

  • Discuss five application vulnerabilities it could possibly detect in the Order Entry application.
  • Discuss three database vulnerabilities it could possibly detect in the Order Entry application.
  • Compare its features with the features of Fiddler debugging tool, please note that the Fiddler debugging tool is found on this website https://telerik.com/fiddler

Additional Information:

This question is from Computer Science as well as it explains about order entry application of company which has main risk factor. This risk factor needs to be reduced. A vulnerability scanner require to be downloaded and check order entry application for vulnerabilities.

Total Word Limit: 611 Words

Reference no: EM13829549

Questions Cloud

Describe the three stages of language development : In your own words, describe the three stages of language development (prelinguistic, phonological, and semantic) and summarize the hallmarks and importance of each
Prepare a paper on retirement planning : View the given Seminar on Retirement Planning and write a one page paper, double spaced that summarizes the Seminar and what you learned.
Problem regarding the computer forensics investigations : The human resources team in your organization needs to ensure that any computer forensics investigations that your team conducts will be sound and will potentially hold up in the court of law.
Access control policy for lmj-star services : You have been asked to develop an access control policy for LMJ-Star Services (LSS) based on your understanding of the sensitivity of financial data and health care data.
Checking risk-vulnerability factors of web application : The company CEO learned that input validation of user entered data to Order Entry Internet web application is one major security risk that the company must address comprehensively and thoroughly.
Research about vendors and open-source solutions : Conduct research on vendors and open-source solutions that provide antivirus software for the three operating systems at MWS: Macintosh, Windows, and Linux. Prepare a paper of 2-3 pages that includes a recommendation for third-party tools for MWS...
Problem on cto security controls-protocols : Provide responses to the following concerns posed by the Chief Technology Officer (CTO). Provide a report with responses to the CTO in a memo format, with responses of at least 1 page per concern:
Report on wits business school human rights analysis : Report On Wits Business School Human Rights Analysis
Write an essay that describing the sociological forces : The problem is belongs to Sociology and the problem explore the sociological forces that have generated controversy over same-sex marriages and civil unions in the United States.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine features and capacities of ram-disk storage

Determine the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will need for her site.

  Problem regarding the exception handling

First, create three exception classes named NumberHighException, NumberLowException, and NumberNegativeException. Both NumberHighException and NumberLowException should be directly subclassed from the Exception class

  A network analyzer displays the following ip datagram

A network analyzer displays the following IP datagram that carries a UDP segment. Use the IP and UDP headers to answer the following questions

  What type of damage these computer infections can do to data

Virus, Trojan, Worm, Rootkit, Describe how each applies to the realm of data communication. Also, discuss what type of damage these computer infections can do to data in a computer.

  Security staff on encryption techniques

You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises.Use a 2-stage transpo..

  How many block of main memory is needed-direct mapped cache

Suppose a computer using direct mapped cache has 2^32 words of main memory and a cache of 1024 blocks, where each cache block contains 32 words. How many block of main memory are there?

  Briefly explain how a penetration tester could assess risk

Briefly explain how a penetration tester could assess the risk involved with identified vulnerabilities.

  Draw a circuit using only two-input nand gates

Prove this by showing how you can implement the functions of an inverter, and AND gate, and an OR gate just using NAND gates. That is for each function draw a circuit using only two-input NAND gates that implements the operation.

  Critical review

A critical review is much more than a simple summary; it is an analysis and evaluation of a book, article, or other medium. Writing a good critical review requires that you understand the material, and that you know how to analyze and evaluate tha..

  Explain the means of investigating trademark

Discuss and explain the means of investigating trademark and copyright infringement, sexual harassment incidents, and child pornography and laws concerning those incidents.

  Why would a network manager benefit

Why would a network manager benefit from having network management tools? Describe 5 scenarios.

  Describing the hardware and software used to support

Write a 1100-1350 word paper describing the hardware and software used to support personal, workgroup, and enterprise computing within your current organization, an organization with which you are familiar, or an organization that you can inte..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd