What was the purpose of the research project

Assignment Help Basic Computer Science
Reference no: EM131412096

Case Project 12-1: Web Server Security Analysis

A challenge that faces the information security community is to make sure their organizations' top decision makers understand the importance of effective security policies. Understandably, managers who are responsible for an organization's financial stability want to ensure that investments in "nonrevenue" activities are necessary and effective. In many ways, the field of information security is in its infancy; practitioners do not have a long history of research that indicates the most effective security countermeasures against specific threats. Also, the threats are constantly changing. As new generations of information security workers secure digital assets, they will also need to create a solid body of research-based evidence to support the practices they recommend. In this project, you read and summarize a research project that addresses Web server security.
Go to www.sans.org/reading_room/whitepapers/webservers/comparative-studyattacks-corporate-iis-apache-web-servers_33734. Read the entire article, including the appendices. Answer the following questions:

1. What was the purpose of the research project?

2. What did the research demonstrate about the relative security of the IIS and Apache software?

3. What do you think detracted from the credibility of the report?

4. What were the main findings of the study?

5. What did the results of the study imply about the frequency of automated attacks versus the frequency of manually controlled attacks against Web servers?

6. Based on the results of the study, what policies and procedures would you recommend for Web server security?

7. Based on this study, which operating system is easier to attack: Windows or Linux?

Reference no: EM131412096

Questions Cloud

Manufacture wine goblets : You manufacture wine goblets. In mid-June, you receive and order for 10,000 goblets from Europe. Payment of €400,000 is due in mid-December. You expect the €uro to rise from its present rate of $1=€1.5, to a rate of $1=€1.4 by December.
Which competitors might be adversely affected : The rumor mill has been filled with stories of Amazon and its desire to the enter the world of brick and mortar retailing. Now comes evidence (via a liquor license) that it is planning a drive-through grocery. Your task is to write a position pape..
Whether or not given is a good sampling plan : She decides to sample lakes by randomly dropping grains of rice on the map and measuring the area of the lakes hit by the rice. Comment on whether or not you think this is a good sampling plan.
Weighted average cost of capital : What is the weighted average cost of capital for Crescent Corporation?
What was the purpose of the research project : What did the results of the study imply about the frequency of automated attacks versus the frequency of manually controlled attacks against Web servers?
The case of sampling service times at the bank window : The sampling by touch method is said to suffer from selection bias, in that the longer strings get chosen more often than the shorter ones.- What are the implications of this phenomenon in the case of sampling service times at the bank window?
Create a customer relationship management plan : Think of a company that has provided great customer service to you recently.What did it do? How did it go beyond what you expected? What do companies have to do to get employees to deliver such services?Are loyalty programs more likely to be successf..
Calculate usd denominated cash flow scenarios for project : Project - Specific financial analysis: Exchange rate scenarios, cost of capital estimate. How does this number differ from the inflation parity rate? Which exchange rate scenario is closest to the implied forward rate? Calculate the USD denominated c..
How one might get unbiased data in given situations : Suggest other situations in which selection bias could be important. Discuss how one might get unbiased data in these situations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How a circulator could be arranged to do the same thing

Draw a sketch showing how a hybrid tee could be used to connect a transmitter and a receiver to the same antenna in such a way that the transmitter power would not reach the receiver.

  Protecting browsers from dns rebinding attacks

Write a Review/Critique paper of the following articles: Collin Jackson et al., "Protecting Browsers from DNS Rebinding Attacks", In Proceedings of ACM CCS, 2009.Robin Sommer and Vern Paxson, "Enhancing Byte-Level Network Intrusion Detection Signat..

  Propose a mechanism that might be used by datagram switches

Propose a mechanism that might be used by datagram switches so that if one switch loses all or part of its forwarding table, affected senders are informed of the failure.

  Relational database model

Why a database is called as relational database model?

  Creating and configuring virtual machine settings

Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the Microsoft® Official Academic Course (MOAC) Lab Challenges, independent student reading, and research.• Complete MOAC Lab 7, "Cre..

  Dc series motor and dc shunt motor

Explain the uses of: shaded - pole motor, capacitor start motor, DC series motor and DC shunt motor.

  Prove by contradiction that if n is a perfect square

Let n > 1 be an integer. Prove by contradiction that if n is a perfect square, then n + 3 cannot be a perfect square.

  The value display style tells the browser not the element

The ____ value of the display style tells the browser not the display the element.

  Designing a computer network

Explain the five most important things that should be taken into consideration when designing a computer network.Your paper should be 1,000 words and should include APA formatting.

  Investigate this tool using either powerpoint or keynote

Investigate this tool using either PowerPoint or Keynote. Design an iPhone application that would be useful for you or successful in the marketplace.

  Balanced binary search tree of height

Write a function to generate a perfectly balanced binary search tree of height h with keys 1 through 2h+1 - 1. What is the running time of your function?

  Commands will encrypt line passwords on router

Which one of the following configuration register settings will cause the router to boot normally into the IOS contained in the flash memory?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd