Discuss three known vulnerabilities on the technologies

Assignment Help PHP Web Programming
Reference no: EM13780891

Security Alerts

The Internet has turned into an around the clock battle ground of attackers and attackees. It is estimated that there are millions of compromised computers and servers known as bots, which are distributed throughout the world at any given time. Bots are responsible for becoming spam bots, web spiders, DDoS attackers, and can be used for other destructive and illegal activities.

To ensure that the Zeus Books web server doesn't become a bot, it is important the web server is secured and protected from being compromised through exploits and attacks. Zeus Books is requesting you to perform a web server security mitigation assessment.

In the assessment, Zeus Books has requested that you provide three known exploits on the following products and the solutions to mitigate any possible attacks leveraging versions you are currently running the Zeus Books website on:

Windows

Hypervisor (the one you recommended in the discussion assignment)
Apache 2.X
PHP

Based on your understanding of web server security, create a 4- to 5 page report (not including the reference page) in a Microsoft Word document answering the following:

Discuss three known vulnerabilities or exploits on the technologies above.
Discuss how you will be able to mitigate the known vulnerabilities or exploits.
Discuss any security software or hardware components which should be used to protect Zeus's website.
Discuss how you plan to monitor the Zeus Books web server for ongoing security alerting.

Must meet this grading criteria

* Support your responses with examples.
* Cite any sources in APA format.
* Analyzed and examined ways in which webserver is secured and protected from being compromised through exploits and attacks.
* Analyzed and provided a webserver security mitigation assessment.
* Explained three known exploits on Windows, Hypervisor, Apache 2.X, PHP and the solutions to mitigate any possible attacks leveraging versions you are currently running the Zeus Books website.
* Summarized ways to monitor the Zeus Books webserver for ongoing security alerting.
* Written Components

Reference no: EM13780891

Questions Cloud

Differences between the sufi-buddhist : What are the main differences between the Sufi, Buddhist, and Hindu views about the nature of God? t is important that the explanations are in your own words and that you provide examples to illustrate key points.
What are symptoms of an underperforming network : What are 3 symptoms of an underperforming network. Describe each symptom. How can they be fixed
Software services versus software components : Consider a legacy system and explain how services could be used to implement wrappers to provide access to the system functionality and data for applications built with modern technologies.
Respond to the intelligence-led policing : The Intelligence-Led Policing (ILP) that is occurring within the scenario involving Major Warren is not something that is uncommon. ILP is composed of six different steps in order to guide decision making when relying on the analysis of raw infor..
Discuss three known vulnerabilities on the technologies : Discuss three known vulnerabilities or exploits on the technologies above. Discuss how you will be able to mitigate the known vulnerabilities or exploits.
Brain damage and central nervous system impairment : Edward is a seven-year-old boy who has difficulty reading. His teacher refers him to the school psychologist to evaluate for a learning disability. The psychologist's report concludes that Edward has dyslexia and mild central nervous system impair..
Provide a bulleted plan of action for solutions you suggest : Provide a bulleted plan of action for the solutions you suggest. Finally discuss the best solutions in your estimation.
Assignment on global operations management : Global Operations Management Assignment.As part of the management team for PPQ Parts manufacturing company.
Evaluation of each carriers overarching business strategy : Conclude with an evaluation of each carriers overarching business strategy. Explain your assessment of the most profitable strategy - Upon reading the paper, a potential passenger should have the information needed to choose between the two airli..

Reviews

Write a Review

PHP Web Programming Questions & Answers

  Dynamic page which receive a in put

Write a program in php to generate a dynamic page which receive a in put and print it on the screen

  Define a constructor for class game that takes the initial x

Define a constructor for class Game that takes the initial x and y positions of the player as parameters and creates and initialises the player, dot1, dot2 and dot3 fields.

  Question 1 what type or types of business entityies do you

question 1. what type or types of business entityies do you recommend able baker charlie and delta create?question 2.

  Casemr red bought a powerboat from blacks boat sales under

casemr. red bought a powerboat from blacks boat sales under a conditional sale agreement paying 5000 down with the

  The open university running club ourc has engaged the

the open university running club ourc has engaged the services of a web design consultancy to develop a dynamic website

  Create a data structure containing a list of degree

Create a data structure containing a list of degrees available (i.e. PhD, MS, MA, BS, etc) and a price for each degree.

  Non-functional mock-up of web pages

Non-functional mock-up of Web pages Diagram of database tables with column names and data types Final tested version of all Web application software.

  Qestion 1discuss the differences and similarities of

question 1discuss the differences and similarities of the ppsa and the bank act regarding secured

  Which of the following jsp expressions is valid

A JSP expression can contain any Java expression that evaluates to a String object, Java object, primitive type, primitive type or Java object

  Describe the company and the product safety issue that led

describe the company and the product safety issue that led to the lawsuit.discuss the legal theories used by the

  Fona macfarlane was a door-to-door sales representative

fiona macfarlane was a door-to-door sales representative in the business of selling computers and all their

  Cse john worked as an employee for mcgraw-hill

case john worked as an employee for mcgraw-hill publishing company for fifteen years and had worked his way

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd