Assignment on software vulnerability

Assignment Help Computer Network Security
Reference no: EM13861750

Assignment on Software Vulnerability Software vulnerabilities, especially vulnerabilities in code, are a major security problem today. Not all bug or flaws in software become security vulnerabilities, but some of them do. An attacker can exploit these vulnerabilities to cause major disruption to a business.

An exploit can result in a variety of damages including crash of a system, taking the role of a super user, deleting of information in a file or an entire file, changing critical content in a database or a file, stealing valuable proprietary information, planting of malware, turning a system into a bot so to launch attacks on other systems.

Common software code vulnerabilities include: Buffer overflow Logic error or logic bombs Race conditions Format string vulnerability Cross-site scripting Cross-site request forgery SQL and other command injection Memory leak Incomplete mediation Integer overflow, underflow, and sign conversion errors Insufficient data validation The name of vulnerability and the name of an attack that exploits it are often called by the same name.

For example, the attack that exploits the buffer overflow vulnerability is known as the buffer overflow attack. Similarly, a race-condition attack leverages a race condition vulnerability.

An attacker can and have exploited more than one vulnerability in the same attack to cause more damage than would be possible with a single vulnerability.

Two organizations focus on improving software security and thus track the various vulnerabilities on a continual basis.

They are (1) Common Weakness Enumeration (CWE) by SANS/Mitre HYPERLINK "https://cwe.mitre.org/index.html" https://cwe.mitre.org/index.html), and (2) The Open Web Application Security Project (OWASP) (see HYPERLINK "https://www.owasp.org/index.php/About_OWASP" https://www.owasp.org/index.php/About_OWASP ).

I am attaching two documents here two documents, CWE Top 25 and OWASP Top 10. Please note the vulnerabilities or the type of vulnerabilities are not the same in these two lists.

This is because, OWASP's focuses only on web applications. Also, the two lists are also not exactly the same as the above bulleted list. They do, however, overlap.

In this exercise, you will investigate two vulnerabilities of your choice from these two lists or any other reputable source. For each of the two vulnerabilities you have chosen, you will explain the vulnerability including where it occurs (e.g., C language, database, web browser, etc.), and an example attack that exploited it.

You will also describe how the vulnerability can be minimized, prevented or mitigated. All the description should be in your own words. You may use code excerpt to illustrate the vulnerability or remove the flaw that is the source of the vulnerability. Your report should not be more than two pages long (double-spaced) for each vulnerability.

You need to consult at least two references for each vulnerability. If you have a good C/C++ programming background, you may want to explore the following site: HYPERLINK "https://www.cis.syr.edu/~wedu/seed/labs.html" https://www.cis.syr.edu/~wedu/seed/labs.html (See Software Security and Web Security Labs.)

There is an in-depth technical description and even a video class room presentation on many of these vulnerabilities, and how to exploit them and mitigate them in a lab setting.

Feel free to try the one or more of these laboratory exercises using the Ubuntu VM you can download from the site, but you are on your own.

I would certainly like to hear about your experience if you have actually tried one or more of these lab exercises.

Reference no: EM13861750

Questions Cloud

Design addresses the values of the organization : Completely redesign the IBM LOGO Use word, PowerPoint,or any application. The logo should represent the values of the organization. Using PowerPoint to create a presentation to sell your logo.
Write paper a about condition monitoring for solar cells : Write a research paper about CONDITION MONITORING FOR THE LIFE CYCLE OF SOLAR CELLS. Analyse the data available (past researches) and use it to create the preliminary report or background/introduction.
Increase in the supply of reserves in the banking system : Which of the following is a rate that should theoretically serve as a floor for the Fed funds rate? A dealer is said to be running a "matched book" if. An increase in the supply of reserves in the banking system leads to an increase in the Fed funds ..
Evaluation of what they eat an example of ethnocentrism : How is your evaluation of what they eat an example of ethnocentrism? What about your cultural practices makes those food seem weird? How can you look at what they eat in a more culturally relative way
Assignment on software vulnerability : Assignment on Software Vulnerability - Software vulnerabilities, especially vulnerabilities in code, are a major security problem today - Investigate two vulnerabilities of your choice from these two lists or any other reputable source
Price elasticity of demand : If the price elasticity of demand is E = -1/2, a 10% increase in the price will
Any example of irrational behavior by consumers : Economists assume that consumers attempt to maximize their utility based upon their preferences, income and price of commodities. do you see any weakness of the above are you aware of any example of irrational behavior by consumers(or yourself )?
Advantages and disadvantages of using teams at holden? : What are the advantages and disadvantages of using teams at Holden?
Analysis of the financial crisis in greece : Which sociological concepts can you apply to your analysis of the financial crisis in Greece? How best can you explain the problem and the solution- if any- in sociological terms

Reviews

Write a Review

Computer Network Security Questions & Answers

  Sarbanes-oxley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act

  Which of risks gci faces are most significant to company

What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilities identified in part (a).

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Temporary assistance for needy families

TANF is the public program responsible for offering cash assistance to low-income families with children. However, the sector has been challenged by numerous laws and limitations as to how the industry carries on it functions.

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  What is meant by multi-modal biometrics for access control

What is meant by "Multi-modal Biometrics" for access control. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Information security standards for an organization

Every organization must consider the mandatory and recommended practices when creating its information security program and/or security policies.

  Discuss the issue of security challenges on the internet

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Problem regarding the cyber-attack

This exercise is to identify and characterize assets. Imagine there is a severe natural calamity in your area and your personal vehicles have been rendered immobile. The local mayor is running school buses on their routes to evacuate residents and..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd