How to defend against attacker on the web

Assignment Help Computer Engineering
Reference no: EM131661034

One aspect of the physical web infrastructure is storage. A number of companies will store your personal information for such reasons as returns, ease of access on future purchases, etc. So the need to keep this information secure is paramount. As a business's revenue comes from customers, so retention is key.

According to Harwood, "The e-business.needs storage methods that keep customer data secure, including personal and credit card information. A hole in any security point can and will likely lead to a security breach," (Harwood, 2016).

Another aspect is web servers which, according to Stuttard, can be severely under secure several. "Historically, many servers have shipped with insecure default options, which present opportunities for attack unless they are explicitly hardened," (Stuttard, 2011).

This causes a real issue especially with administrative privileges as, "Many web servers contain administrative interfaces that may be publicly accessible. Frequently administrative interfaces have default credentials that are well known and are not required to be changed on installation," (Stuttard, 2011). Another aspect of the physical web infrastructure is end user devices. End user devices are an important aspect of the physical web infrastructure and need to be secure.

The reason being is that they are easily attackable, according to Harwood, "MMS messages can successfully carry remote code to be run at the end user's device. End-user devices will receive unsolicited MMS messages, by design, and properly execute injected code within the MMS multimedia," (Harwood, 2016).

This is just one type of end user device, others end user devises include VoIP phones, desktops, laptops, smart phones, tablets, and other gadgets such as smart watches. If the end user devices were issued from the company itself, then the cyber security personnel should have no moral dilemma in monitoring these devices.

Even just talking on the phone can be a security risk, according to Harwood, "there will be a slight increase in risk due to all the vulnerabilities, malware, and hacks that exist for PC-based systems and applications," (Harwood, 2016).

So the need to secure these devices is paramount, if it is within the company's domain to protect. The Bible says, "Then God said, "Let us make man in our image, after our likeness.

And let them have dominion over the fish of the sea and over the birds of the heavens and over the livestock and over all the earth and over every creeping thing that creeps on the earth." (Genesis, 1:26). Bibliography Harwood, M. (2016). Internet Security:

How to Defend Against Attacker on the Web. Jones & Bartlett Publishers. Stuttard, D., & Pinto, M. (2011). The web application hacker's handbook: finding and exploiting security flaws. John Wiley & Sons.

Article with references in APA format.

Verified Expert

The paper is about the opinion about the web infrastructure, security and the bible verse which is highlighted in the paper. This paper has been prepared in Microsoft Word Document.

Reference no: EM131661034

Questions Cloud

Explain the appropriateness of the debt policy : BAFN602: Corporate Finance Assessment. Obtain the financial statements for Woolworths and Telstra. In another word, explain the appropriateness of debt policy
Analyze the network diagram for pureland wastewater : This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.
Percentage error of water : What would be the percentage error of water if the volume was 5.0 ml, Mass A of the Graduated Cylinder is 19.50, mass B.
Develop a comprehensive policy statement for internet : Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing.
How to defend against attacker on the web : Even just talking on the phone can be a security risk, according to Harwood, there will be a slight increase in risk due to all the vulnerabilities
Discuss professional education in terms of costs : The various kinds of health professionals are educated in separate schools but with considerable overlap in curricula and training requirements
Analyze project management processes : Examine communication, human resources, procurement, and stakeholder management as project management functions.
What are the concentrations of all ions left in solution : Assuming that the volume is still 1.0 L, what are the concentrations of all ions left in solution?
What are implications of shorter life expectancy among men : Identify the leading causes of death and disability by age group, sex, race, and ethnicity, What are the implications of shorter life expectancy among men

Reviews

inf1661034

12/29/2017 5:14:16 AM

I had issues finishing my assignments, and after that I became acquainted with about your online task assistance. I am happy your task specialists finished my task like eating cake. Anticipating profit your task help once more. Thanks a lot.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd