How to defend against attacker on the web

Assignment Help Computer Engineering
Reference no: EM131661034

One aspect of the physical web infrastructure is storage. A number of companies will store your personal information for such reasons as returns, ease of access on future purchases, etc. So the need to keep this information secure is paramount. As a business's revenue comes from customers, so retention is key.

According to Harwood, "The e-business.needs storage methods that keep customer data secure, including personal and credit card information. A hole in any security point can and will likely lead to a security breach," (Harwood, 2016).

Another aspect is web servers which, according to Stuttard, can be severely under secure several. "Historically, many servers have shipped with insecure default options, which present opportunities for attack unless they are explicitly hardened," (Stuttard, 2011).

This causes a real issue especially with administrative privileges as, "Many web servers contain administrative interfaces that may be publicly accessible. Frequently administrative interfaces have default credentials that are well known and are not required to be changed on installation," (Stuttard, 2011). Another aspect of the physical web infrastructure is end user devices. End user devices are an important aspect of the physical web infrastructure and need to be secure.

The reason being is that they are easily attackable, according to Harwood, "MMS messages can successfully carry remote code to be run at the end user's device. End-user devices will receive unsolicited MMS messages, by design, and properly execute injected code within the MMS multimedia," (Harwood, 2016).

This is just one type of end user device, others end user devises include VoIP phones, desktops, laptops, smart phones, tablets, and other gadgets such as smart watches. If the end user devices were issued from the company itself, then the cyber security personnel should have no moral dilemma in monitoring these devices.

Even just talking on the phone can be a security risk, according to Harwood, "there will be a slight increase in risk due to all the vulnerabilities, malware, and hacks that exist for PC-based systems and applications," (Harwood, 2016).

So the need to secure these devices is paramount, if it is within the company's domain to protect. The Bible says, "Then God said, "Let us make man in our image, after our likeness.

And let them have dominion over the fish of the sea and over the birds of the heavens and over the livestock and over all the earth and over every creeping thing that creeps on the earth." (Genesis, 1:26). Bibliography Harwood, M. (2016). Internet Security:

How to Defend Against Attacker on the Web. Jones & Bartlett Publishers. Stuttard, D., & Pinto, M. (2011). The web application hacker's handbook: finding and exploiting security flaws. John Wiley & Sons.

Article with references in APA format.

Verified Expert

The paper is about the opinion about the web infrastructure, security and the bible verse which is highlighted in the paper. This paper has been prepared in Microsoft Word Document.

Reference no: EM131661034

Questions Cloud

Explain the appropriateness of the debt policy : BAFN602: Corporate Finance Assessment. Obtain the financial statements for Woolworths and Telstra. In another word, explain the appropriateness of debt policy
Analyze the network diagram for pureland wastewater : This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.
Percentage error of water : What would be the percentage error of water if the volume was 5.0 ml, Mass A of the Graduated Cylinder is 19.50, mass B.
Develop a comprehensive policy statement for internet : Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing.
How to defend against attacker on the web : Even just talking on the phone can be a security risk, according to Harwood, there will be a slight increase in risk due to all the vulnerabilities
Discuss professional education in terms of costs : The various kinds of health professionals are educated in separate schools but with considerable overlap in curricula and training requirements
Analyze project management processes : Examine communication, human resources, procurement, and stakeholder management as project management functions.
What are the concentrations of all ions left in solution : Assuming that the volume is still 1.0 L, what are the concentrations of all ions left in solution?
What are implications of shorter life expectancy among men : Identify the leading causes of death and disability by age group, sex, race, and ethnicity, What are the implications of shorter life expectancy among men

Reviews

inf1661034

12/29/2017 5:14:16 AM

I had issues finishing my assignments, and after that I became acquainted with about your online task assistance. I am happy your task specialists finished my task like eating cake. Anticipating profit your task help once more. Thanks a lot.

Write a Review

Computer Engineering Questions & Answers

  What other solutions might you consider in order to increase

What other solutions might you consider in order to increase throughput and reduce latency? Which solution do you consider to have the better trade-off between performance and complexity?

  Answer the following

What is final value of y after executing the following code.

  Identify possible threats internal or external to a database

Identify possible threats internal or external to a database that may affect the following components of a database system

  Implementation of initialization of datatypes of the classes

MN404- T1 2017 Fundamentals of Operating Systems and Java Programming Assessment. Implementation of initialization of datatypes of the classes

  Write a function that inputs a string

Write a function that inputs a string. Write a second function that changes the blanks in the string to tabs. Write a third function that displays the string. Call these three functions to read an input string, changes spaces to tabs in it then di..

  Think of an organization that uses information technology

think of an organization that uses information technology but would not need to provide for information security on

  You have been asked by your supervisor to create an

suppose you are working as a senior software development manager in a software house. the company develops custom

  Determine the angle of twist at b and c

For the shaft in Problem. replace the torque at C by two equal torques of 1500 lb-in at B and C. Compute the angle of twist at B and C and the torsional.

  Why do bidirectional data ports on a microcontroller

Use a 74HC 138 1-of-8 decoder and a 74HC 151 8-to-1 multiplexer to design a key-board scanner that will scan an 8 x 8 keyboard matrix.

  What is the storage capacity and maximum data transfer rate

A magnetic tape, 800 bits per inch, 2400 feet long, 10 inch per second? A magnetic disk with 50 tracks and 4K bits per track, rotating at 3600 rpm?

  Examine the behavior of airfoil

Write HW assignment written in Matlab airfoils have different C mc/4

  Calculate and display the percentage of calories

Once correct data has been entered the program should calculate and display the percentage of calories that come from fat.Use the following formula: percentage of calories from fat=(fat grams x 9) / calories

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd