Examine three web application vulnerabilities and attacks

Assignment Help Computer Network Security
Reference no: EM131143887

Assignment 1: Web Server Application Attacks

It is common knowledge that Web server application attacks have become common in today's digital information sharing age. Understanding the implications and vulnerabilities of such attacks, as well as the manner in which we may safeguard against them is paramount, because our demands on e-Commerce and the Internet have increased exponentially. In this assignment, you will examine the response of both the U.S. government and non-government entities to such attacks.

To complete this assignment, use the document titled "Guidelines on Securing Public Web Servers", located at https://csrc.nist.gov/publications/nistpubs/800-44-ver2/SP800-44v2.pdf, to complete the assignment. Read the Network World article, "40% of U.S. government Web sites fail security test" also, located at https://www.networkworld.com/news/2012/031512-dnssec-survey-2012-257326.html.

Write a three to five page paper in which you:

1. Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.

2. Using Microsoft Visio or an open source alternative such as Dia, outline an architectural design geared toward protecting Web servers from a commonly known Denial of Service (DOS) attack. Note: The graphically depicted solution is not included in the required page length.

3. Based on your research from the Network World article, examine the potential reasons why the security risks facing U.S. government Websites were not always dealt with once they were identified and recognized as such.

4. Suggest what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to which the article refers. Propose a plan that the U.S. government could use in order to ensure that such mitigation takes place. The plan should include, at a minimum, two mitigation or defense mechanisms.

5. Use at least three quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Define common and emerging security issues and management responsibilities.
• Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures.
• Use technology and information resources to research issues in security management.
• Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Reference no: EM131143887

Questions Cloud

Prepare a single step income statement : In its income statement for the year ended December 31, 2010, Pele Company reported the following condensed data.
The company uses the five activity cost pools are : the costs of managing the indoor tenant space depend on whether the tenants are located on the main level or other levels of the mall. Accordingly, the company uses the five activity cost pools listed below are:
Describe and define the scope of the project : Describe and define the scope of the project. Speculate as to how to control the scope. Identify possible risks, constraints, and assumptions.
What red flags did the auditors miss : What steps does an auditor ordinarily take when confirming cash balances held on deposits with financial institutions?
Examine three web application vulnerabilities and attacks : Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.
Presented below is information for obley company : Presented below is information for Obley Company for the month of March 2010.
Determine the shearing stress at points a and b : A 90-N.m torque is applied to a hollow shaft having the cross section shown. Neglecting the effect of stress concentrations, determine the shearing stress at points a and b.
Prepare the necessary closing entries : Presented is information related to Rogers Co. for the month of January 2010.
Identify the primary benefits of byod in organizations : Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Classify the following vulnerabilities using the risos model

Classify the following vulnerabilities using the RISOS model. Assume that the classification is for the implementation level. Justify your answer.

  What was the apparent motivation of the attacker

Who was the victim of the attack? Who was the attacker, if known? What did the attacker do to the victim? What was the apparent motivation of the attacker?

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  Identify 3 different computer crimes that you are aware

computer crime has become a serious matter for your discussion board post consider the following do you think computer

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Assignment on internet hacking

The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary

  Determine what the risk to an organisation is

Determine what the risk to an organisation is, you need to know what the problems could be - how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

  Calculate the total gross pay for each employee.

Calculate the total Gross Pay for each employee. Keep in mind that employees are paid time and a half for all over-time hours. Here is an example formula that demonstrates how you would make such a calculation: =b4*d4+b4*c4*1.5 These must be formu..

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  What is the scope of environmental microbiology

What is the scope of "environmental microbiology?" How is it defined and what does it include? What are the core features of this area of microbiology?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd