How to defend against attacker on the web

Assignment Help Computer Engineering
Reference no: EM131661034

One aspect of the physical web infrastructure is storage. A number of companies will store your personal information for such reasons as returns, ease of access on future purchases, etc. So the need to keep this information secure is paramount. As a business's revenue comes from customers, so retention is key.

According to Harwood, "The e-business.needs storage methods that keep customer data secure, including personal and credit card information. A hole in any security point can and will likely lead to a security breach," (Harwood, 2016).

Another aspect is web servers which, according to Stuttard, can be severely under secure several. "Historically, many servers have shipped with insecure default options, which present opportunities for attack unless they are explicitly hardened," (Stuttard, 2011).

This causes a real issue especially with administrative privileges as, "Many web servers contain administrative interfaces that may be publicly accessible. Frequently administrative interfaces have default credentials that are well known and are not required to be changed on installation," (Stuttard, 2011). Another aspect of the physical web infrastructure is end user devices. End user devices are an important aspect of the physical web infrastructure and need to be secure.

The reason being is that they are easily attackable, according to Harwood, "MMS messages can successfully carry remote code to be run at the end user's device. End-user devices will receive unsolicited MMS messages, by design, and properly execute injected code within the MMS multimedia," (Harwood, 2016).

This is just one type of end user device, others end user devises include VoIP phones, desktops, laptops, smart phones, tablets, and other gadgets such as smart watches. If the end user devices were issued from the company itself, then the cyber security personnel should have no moral dilemma in monitoring these devices.

Even just talking on the phone can be a security risk, according to Harwood, "there will be a slight increase in risk due to all the vulnerabilities, malware, and hacks that exist for PC-based systems and applications," (Harwood, 2016).

So the need to secure these devices is paramount, if it is within the company's domain to protect. The Bible says, "Then God said, "Let us make man in our image, after our likeness.

And let them have dominion over the fish of the sea and over the birds of the heavens and over the livestock and over all the earth and over every creeping thing that creeps on the earth." (Genesis, 1:26). Bibliography Harwood, M. (2016). Internet Security:

How to Defend Against Attacker on the Web. Jones & Bartlett Publishers. Stuttard, D., & Pinto, M. (2011). The web application hacker's handbook: finding and exploiting security flaws. John Wiley & Sons.

Article with references in APA format.

Verified Expert

The paper is about the opinion about the web infrastructure, security and the bible verse which is highlighted in the paper. This paper has been prepared in Microsoft Word Document.

Reference no: EM131661034

Questions Cloud

Explain the appropriateness of the debt policy : BAFN602: Corporate Finance Assessment. Obtain the financial statements for Woolworths and Telstra. In another word, explain the appropriateness of debt policy
Analyze the network diagram for pureland wastewater : This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.
Percentage error of water : What would be the percentage error of water if the volume was 5.0 ml, Mass A of the Graduated Cylinder is 19.50, mass B.
Develop a comprehensive policy statement for internet : Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing.
How to defend against attacker on the web : Even just talking on the phone can be a security risk, according to Harwood, there will be a slight increase in risk due to all the vulnerabilities
Discuss professional education in terms of costs : The various kinds of health professionals are educated in separate schools but with considerable overlap in curricula and training requirements
Analyze project management processes : Examine communication, human resources, procurement, and stakeholder management as project management functions.
What are the concentrations of all ions left in solution : Assuming that the volume is still 1.0 L, what are the concentrations of all ions left in solution?
What are implications of shorter life expectancy among men : Identify the leading causes of death and disability by age group, sex, race, and ethnicity, What are the implications of shorter life expectancy among men

Reviews

inf1661034

12/29/2017 5:14:16 AM

I had issues finishing my assignments, and after that I became acquainted with about your online task assistance. I am happy your task specialists finished my task like eating cake. Anticipating profit your task help once more. Thanks a lot.

Write a Review

Computer Engineering Questions & Answers

  Discuss the implementation of the procedures that you chose

Discuss the implementation of the procedures that you chose in Step 3, and create fictional results. Explain the method(s) that you used to observe the results.

  Is it okay for you to borrow the software

Is it okay for you to borrow this software? Would it be okay if you uninstalled the application after you were finished using it? Would it be okay if the software was on the school's network and you could copy it from there?

  What is green computing and green communication technology

What is Green Computing and Green Communication technology.

  Suppose that a unique priority number is associated

find an election algorithm for bidirectional rings that is more efficient than the ring algorithm.

  Estimate the average mass-transfer rate per unit

It is required to estimate the average mass-transfer rate per unit area of benzene evaporating from the outer surface of a circular cylinder across.

  What are the differences between a bra and a mp instruction

Both ADDQ and MOVEQ are used with small operands. Apart from the obvious difference (ADDQ adds and MOVEQ moves).

  What types of memory will you use and why

What types of memory will you use and why? In the example of a music-streaming device, we can use cache memory to store temporary song as they are being played.

  Questionin visual basic 2010 please give completed

questionin visual basic 2010. please give completed application as a .zip filea small airline has just purchased a

  Determining output of program

Explain the output if input is diamond? State the output if input is diamond gold?

  Define how the lack of metrics for measuring

define how the lack of metrics for measuring certain software properties affects the software engineering discipline.

  Write down a class named testscores

Write down a class named TestScores. The class constructor should accept an array of test scores as its argument. The class should have a process that returns the average of the test scores.

  Implement an application that will hold the customer list

You will need to implement an application that will hold the customer list for Acme Anvil Supply. This list will be read from a file and stored in a binary tree.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd