Deploy appropriate internet based application security model

Assignment Help Other Subject
Reference no: EM133926885 , Length: word count:3000

Cloud and Web Services Security

Assignment Brief.

As part of the formal assessment for the programme you are required to submit a Cloud and Web Services Security assignment. Please refer to your Student Handbook for full details of the programme assessment scheme and general information on preparing and submitting assignments.

Learning Outcomes:

After completing the module, you should be able to:

Recognise common security threats to contemporary Cloud and Web Services.
Deploy appropriate Internet based application security models to secure applications against potential security threats, evaluating these models against relevant security standards.
Appraise social, ethical and legal considerations relevant to Cloud and Web applications and their impact in an enterprise.
Graduate Attribute:
Professionally knowledgeable in their subject area
Critically evaluate and further contextualise understanding of subject area with the ability to link the discipline(s) to local, national and global issues, research and pursue evidence- based arguments within the discipline using an extensive range of academic and professional body resources. Show clear ability to engage with different traditions of thought, and the ability to apply their knowledge in practice including in multi-disciplinary or multi- professional contexts.

Assignment Task Scenario:

Plotsner, an IT Security officer, discovered that a browser extension has introduced a vulnerability that makes it easy for attackers to hijack sessions on public Wi-Fi networks. The extension seems to allow anyone on the same network to view and capture session cookies of users accessing popular websites over unsecured HTTP connections.

A government agency's web portal has been targeted by attackers. The attackers replaced the homepage with illegal content, which caused the temporary closure of the website. Armel, Cybersecurity Administrator, reported that it was a web server attack in which the attackers were able to disable all the implemented security controls.

Britta, a Security Engineer in the financial industry, has identified a possible SQL Injection attack in their database, which has allowed the attacker to retrieve personally identifiable information, such as usernames, passwords, salary, etc .

Lissa, a penetration tester, found a Local File Inclusion (LFI) web application vulnerability on a shopping website that allows malicious threat actors to access, view, and add files that are located within the document root directory and its subdirectories.

Part 1: Mini Project

You MUST use the platform details as provided by your lecturer otherwise a 0 mark will be given.

Select one of the provided scenarios and, taking on the role of a Security Analyst, complete the following:

Threat Model and Risk Analysis: Using a recognized security model identify and assess the security threats and associated risks for the specific attack in the scenario.

Implementation Documentation: For two security threats relating to Cloud and Web services security that you have identified in your threat and risk analysis, in the platform provided, demonstrate how the attack would occur. Using screenshots, document the steps within the attack, ensuring you evidence all the tools and phases taken. Get expert-level assistance in any subject with our assignment help services.

Part 2: Report

For the chosen scenario, critically evaluate the current threat landscape and using a suitable security model, recommend and justify a solution showing how it offers mitigation from attacks.

Reflect on the social, ethical, and legal implications relevant to the scenario and their impact on the business enterprise at a local, national and global level.

Reference no: EM133926885

Questions Cloud

How it overcame the obstacle with an alternative strategy : Illustrate how an in-house management team is a strategically global team-based culture.
Assess the benefits and risks of the mining project : Does the distribution among stakeholders of those benefits and risks affect the outcome of the dialogue?
Work of digital investigators and incident responder : Demonstrate how the attack would occur. Using screenshots, document the steps within the attack, ensuring you evidence all the tools and phases taken
What should you explain to your client : During an insurance review with your client Lily, who is 59, she told you she had purchased a universal life insurance. what should you explain to your client?
Deploy appropriate internet based application security model : COM7015 Cloud and Web Services Security, Arden University - Deploy appropriate Internet based application security models to secure applications
Critically reflect on the legal and ethical issues you faced : COM7016 Digital Forensics and Incident Management, Arden University - Construct and carry out a strategy to gather and examine the evidence provided
Waykana-strategic prioritization for entrepreneurs : Regarding the case study "Waykana: Strategic Prioritization for Entrepreneurs,".
Identify nestle services and products processes : Do internet search, report and look for information and Identify Nestle services and products processes.
What amount will his estate receive : Bruce participates in the group insurance plan offered by his employer. Bruce's tax rate is 45%. When Bruce dies, what amount will his estate receive?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd