Identify the threats and attacks that affect application

Assignment Help Computer Engineering
Reference no: EM132069660

Question: 1. Identify security objectives

Security objectives are goals and limitations related to confidentiality, reliability, and access to data and applications. They include:

• This confidentiality includes protection against the disclosure of unauthorized information.

• Honesty this includes avoiding unauthorized changes to the information.

• Availability this includes providing essential services, including during the attack.

2. Create an Application Overview

At this point, explain what your web application does. Its purpose is to identify the main characteristics, attributes and customers of the application. This will help you identify the threats involved in Step 4

3. Decompose Your Application

At this point, divide the question to identify the limits of faith, data flow, intervention points, and marking points. You know more about your system, it is easier to discover threats and find weaknesses. To destroy your request:

4. Identify threats

At this point, identify the threats and attacks that affect your application and affect your security goals(Scandariato,Wuyts, & Joosen, 2015). These threats are the negative effects that can occur in your application. To complete this diagnostic process, bring development members together and evaluate the team to discuss. Use the board to identify possible threats. The best team should have software designers, security professionals, developers, audiences, and system administrators.

5. Identify the weaknesses

At this point, evaluate your web system's security system and look at weaknesses. Focus on risk groups as long as you have identified the threats from the previous step. However, be careful that the sample questions in this section are designed to help you identify weaknesses and not threats. An important way to do this is to explore the cap by software cap, to focus on all types of risk at each level.

Reference no: EM132069660

Questions Cloud

Difference between book value and market value : What is the difference between book value and market value? Which should we use for decision-making purposes?
What type of economic system does it have : Will it be beneficial to all of the stakeholders? In pursuing this, what type of presence do you think would be best suited to your objectives?
Define and discuss the differences between licensure : Define and discuss the differences between licensure, certification, and accreditation as they relate to health care facilities.
New project can only be financed with new equity issue : If the new project can only be financed with a new equity issue, would the shareholders vote for this? Would the creditors?
Identify the threats and attacks that affect application : At this point, identify the threats and attacks that affect your application and affect your security goals(Scandariato,Wuyts, & Joosen, 2015).
Data science major assignment : You are required to present your research in the final week of semester. You will be assigned a time and all group members must attend and present.
What is the entry for the dividend declaration : The board of directors of Capstone Inc. declared a $.40 per share cash dividend on its $1 par common stock. What is the entry for the dividend declaration
Certainty equivalent of the real estate investment : What do you know about the certainty equivalent (for the couple) of the real estate investment?
What are the important elements to running the organization : Larger organizations need more clerical and administrative staff to keep the organization running smoothly.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd