Short notes on web applications attack

Assignment Help Basic Computer Science
Reference no: EM13779883

Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company.

The Software Development Director has asked you to provide a detailed presentation for her department regarding the most common Web application threats and the manner in which their products could compromise customer financial data.

The products in question use Microsoft SQL Server databases and IIS Web servers. She has asked you to provide a report for her review before she schedules the presentation.

Write a two to four (2-4) page paper in which you:

Analyze the common threats to data systems such as Web applications and data servers. Next, speculate on the greatest area of vulnerability and potential for damage and / or data loss of such data systems (e.g., SQL injection,Web-based password cracking).
Devise one (1) attack scenario where a hacker could use the area of vulnerability that you chose in Question 1 in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack.

Explore the primary role that the human element could play in adding to the attack scenario devised in Question 2. Give your opinion on whether or not the human component is critical in protection from that type of attack.
Use at least three (3) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe security concerns, tools, and techniques associated with Web servers and Web applications.

Identify the means of hacking Web browsers.

Summarize the manner in which database servers and applications are compromised and examine the steps that can be taken to mitigate such risks (e.g., SQL injection).

Use technology and information resources to research issues in ethical hacking.

Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM13779883

Questions Cloud

Customer perspective, give an example of a servicescape : Discussion Question:From a customer perspective, give an example of a servicescape that supports the service concept and an example that detracts from the service concept.  Explain the success and the failure in terms of the servicescape dimensions.
How are leaders leading in the 21st century : Leadership Style: How Are Leaders Leading in the 21st Century?
Improve management of its safety and health program : Discuss how OSHA's Field Operations Manual could be used by an organization's management to improve the management of its safety and health program.
Mental disorders and criminal activities : Discuss and examine the career and life of Robert Downey, Jr. Downey, a renowned actor, had a serious addiction to dru
Short notes on web applications attack : The Software Development Director has asked you to provide a detailed presentation for her department regarding the most common Web application threats and the manner in which their products could compromise customer financial data.
Sales promotion strategies : Compare and contrast the three strategies and use one product to illustrate each strategy.
Development of psychology : The main influences involved in the development of psychology. Early research on the function of the brain.
Do you think mcdonald''s breached its implied warranty : The questions to be discussed this week are as follows:  Do you think McDonald's breached it's implied warranty when it sold Ms Liebeck her coffee
Produce a cognitive map on a provided mis topic area : Produce a Cognitive Map (using FreeMind) on a provided MIS topic area (see list of topics below): Expectations are that the map will have a minimum of:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Exposure of the body to external radiation

exposure of the body to external radiation and ingestion or inhalation of radioactive matter

  Section on access controls

Refer to the section on Access Controls. What is the difference between "authorization" and "authentication"? What do we use to perform each of these access control functions? What are the advantages and limitations of the different approaches?

  How can a network designer determine if they are important

How can a network designer determine if they are important, and how are they taken into account when designing a data communications network?

  Describing dot-com bust influenced global economy

Describe how dot-com bust influenced global economy and changed number of workers worldwide. Why is global economy important today?

  Select a current trend in area of telecommunications

Research and select a current trend in the area of telecommunications. Find the topic and send to instructor for approval. Then, prepare a 10-15 page paper in Microsoft Word.

  Roman numerals to a positive integer

Write a program that converts a number entered in Roman numerals to a positive integer

  Prepare a proposal to deploy windows server onto an existing

Prepare a proposal to deploy Windows Server onto an existing network, based on a provided scenario. The proposal will include deployment, security policy, application and data provisioning, monitoring, and continuity plans. For a more detailed projec..

  Which of the following are advantages of the osi model

The OSI model was designed to provide a framework for networking and internetworking standards. Which of the following are advantages of the OSI model?

  Secure organization''s database

Submit a security plan to secure the organization's database. The security plan will be submitted to the CIO. The organization has many concerns about unauthorized access, since there have been reports that some confidential information has been a..

  Fair and responsible use of college computer

Fair and Responsible Use of College Computers" and is based on the rules and regulation provided by your institution. Does your school have a similar policy? Does it contain all the elements listed in the text?

  Deliverable associated required to complete process

Explain in scholarly detail department expense predicting processes and deliverable associated required to complete process.

  What is percentage of time processor is blocked due to dma

Consider a device of 50MBPS is operated in cycle stealing mode of DMA as and when 8byte word is available. It is transferred into the memory in 40ns. What is the percentage of time processor is blocked due to DMA.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd