Examine three web application vulnerabilities and attacks

Assignment Help Computer Network Security
Reference no: EM131143887

Assignment 1: Web Server Application Attacks

It is common knowledge that Web server application attacks have become common in today's digital information sharing age. Understanding the implications and vulnerabilities of such attacks, as well as the manner in which we may safeguard against them is paramount, because our demands on e-Commerce and the Internet have increased exponentially. In this assignment, you will examine the response of both the U.S. government and non-government entities to such attacks.

To complete this assignment, use the document titled "Guidelines on Securing Public Web Servers", located at https://csrc.nist.gov/publications/nistpubs/800-44-ver2/SP800-44v2.pdf, to complete the assignment. Read the Network World article, "40% of U.S. government Web sites fail security test" also, located at https://www.networkworld.com/news/2012/031512-dnssec-survey-2012-257326.html.

Write a three to five page paper in which you:

1. Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.

2. Using Microsoft Visio or an open source alternative such as Dia, outline an architectural design geared toward protecting Web servers from a commonly known Denial of Service (DOS) attack. Note: The graphically depicted solution is not included in the required page length.

3. Based on your research from the Network World article, examine the potential reasons why the security risks facing U.S. government Websites were not always dealt with once they were identified and recognized as such.

4. Suggest what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to which the article refers. Propose a plan that the U.S. government could use in order to ensure that such mitigation takes place. The plan should include, at a minimum, two mitigation or defense mechanisms.

5. Use at least three quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Define common and emerging security issues and management responsibilities.
• Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures.
• Use technology and information resources to research issues in security management.
• Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Reference no: EM131143887

Questions Cloud

Prepare a single step income statement : In its income statement for the year ended December 31, 2010, Pele Company reported the following condensed data.
The company uses the five activity cost pools are : the costs of managing the indoor tenant space depend on whether the tenants are located on the main level or other levels of the mall. Accordingly, the company uses the five activity cost pools listed below are:
Describe and define the scope of the project : Describe and define the scope of the project. Speculate as to how to control the scope. Identify possible risks, constraints, and assumptions.
What red flags did the auditors miss : What steps does an auditor ordinarily take when confirming cash balances held on deposits with financial institutions?
Examine three web application vulnerabilities and attacks : Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.
Presented below is information for obley company : Presented below is information for Obley Company for the month of March 2010.
Determine the shearing stress at points a and b : A 90-N.m torque is applied to a hollow shaft having the cross section shown. Neglecting the effect of stress concentrations, determine the shearing stress at points a and b.
Prepare the necessary closing entries : Presented is information related to Rogers Co. for the month of January 2010.
Identify the primary benefits of byod in organizations : Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How is the security of a firms information system affected

How is the security of a firm's information system and data affected by its people, organization, and technology

  Enterprise network design and network size

In small networks, the web of router links is not complex, and paths to individual destinations are easily deduced. However, in large networks, the resulting web is highly complex, and the number of potential paths to each destination is large.

  Security mechanism for sensor network using xmpp

Security Mechanism For Sensor Network Using XMPP Based Communication - The XMPP communication security mechanism can deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control.

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Explain the site for marketing and site design purposes

Using the library, the Internet, and any other materials, prepare a PowerPoint presentation that outlines the following items

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  Create resolutions/solutions for the threat or vulnerability

In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system.  create resolutions/solutions for the threat or vulnerability

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  What is the decryption function

a). What is the decryption function, b). What is the decrypted plaintext? c). What are some weaknesses of this cipher?

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

1 decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher.2 encrypt the

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Outline the cybersecurity issues of petrochemical industry

Outline the Cybersecurity issues and vulnerabilities of the petrochemical industry. Include in your answer specific actions required to improve the security profile of this industry.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd