Identify the threats and attacks that affect application

Assignment Help Computer Engineering
Reference no: EM132069660

Question: 1. Identify security objectives

Security objectives are goals and limitations related to confidentiality, reliability, and access to data and applications. They include:

• This confidentiality includes protection against the disclosure of unauthorized information.

• Honesty this includes avoiding unauthorized changes to the information.

• Availability this includes providing essential services, including during the attack.

2. Create an Application Overview

At this point, explain what your web application does. Its purpose is to identify the main characteristics, attributes and customers of the application. This will help you identify the threats involved in Step 4

3. Decompose Your Application

At this point, divide the question to identify the limits of faith, data flow, intervention points, and marking points. You know more about your system, it is easier to discover threats and find weaknesses. To destroy your request:

4. Identify threats

At this point, identify the threats and attacks that affect your application and affect your security goals(Scandariato,Wuyts, & Joosen, 2015). These threats are the negative effects that can occur in your application. To complete this diagnostic process, bring development members together and evaluate the team to discuss. Use the board to identify possible threats. The best team should have software designers, security professionals, developers, audiences, and system administrators.

5. Identify the weaknesses

At this point, evaluate your web system's security system and look at weaknesses. Focus on risk groups as long as you have identified the threats from the previous step. However, be careful that the sample questions in this section are designed to help you identify weaknesses and not threats. An important way to do this is to explore the cap by software cap, to focus on all types of risk at each level.

Reference no: EM132069660

Questions Cloud

Difference between book value and market value : What is the difference between book value and market value? Which should we use for decision-making purposes?
What type of economic system does it have : Will it be beneficial to all of the stakeholders? In pursuing this, what type of presence do you think would be best suited to your objectives?
Define and discuss the differences between licensure : Define and discuss the differences between licensure, certification, and accreditation as they relate to health care facilities.
New project can only be financed with new equity issue : If the new project can only be financed with a new equity issue, would the shareholders vote for this? Would the creditors?
Identify the threats and attacks that affect application : At this point, identify the threats and attacks that affect your application and affect your security goals(Scandariato,Wuyts, & Joosen, 2015).
Data science major assignment : You are required to present your research in the final week of semester. You will be assigned a time and all group members must attend and present.
What is the entry for the dividend declaration : The board of directors of Capstone Inc. declared a $.40 per share cash dividend on its $1 par common stock. What is the entry for the dividend declaration
Certainty equivalent of the real estate investment : What do you know about the certainty equivalent (for the couple) of the real estate investment?
What are the important elements to running the organization : Larger organizations need more clerical and administrative staff to keep the organization running smoothly.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a modularized body mass index

build a modularized Body Mass Index (BMI) Program which will calculate the BMI of a team player.

  Write a for loop that prints out the numbers zero to ten

Write a for loop that prints out the numbers 0 to 10. Write a for loop that prints out the numbers -20 to -25 (Hint: Use three arguments).

  Distinguish between fixed and one-time passwords

List and define three kinds of identification witnesses in entity authentication. Distinguish between fixed and one-time passwords.

  Write two functions called gcd and lcm

Write two functions called Gcd and Lcm. The Gcd function takes two positive integers as its parameters and returns their greatest common divisor. The Lcm function takes two positive integers as its parameters and returns their least common multipl..

  How many different identifiers are represented

How many different identifiers are represented if the language is Ada? How many different identifiers are represented if the language is VB.NET?

  Write a function that swaps the values of all the samples

Write a function that swaps the values of all the samples in the first half of the sound with those in the second half.

  Process that handles the customervalidator''s servervalidate

Write down a method that handles the CustomerValidator's ServerValidate event. In addition, write a JavaScript function for the CustomValidator's CustomValidationFunction property. Each method should verify that the user entered an integer in each..

  Give a set of points leading to a worst-case two-d tree

Give a set of points leading to a worst-case 2D tree which has no nodes with two children; give the subdivision of the plane that results.

  Define a class called month that is an abstract data type

Define a class called Month that is an abstract data type for a month. Your class will have one member variable of type int to represent a month.

  Write a script called activity that iterates through content

Write a script called activity that iterates through the contents of your working directory and display the regular file names.

  Describe advantages of using a gantt chart over a pert chart

Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other. Justify your response.

  Produce the collection of sets

COP 4020 Assignment cparse. Read in a start symbol of a set of productions followed by set of productions from stdin and produce collection of sets of LR(0)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd