SlideShare a Scribd company logo
1 of 2
Assignment 2: Web Application Attack Scenario
Suppose that you are currently employed as an Information
Security Manager for a medium-sized software development and
outsourcing services company. The Software Development
Director has asked you to provide a detailed presentation for her
department regarding the most common Web application threats
and the manner in which their products could compromise
customer financial data. The products in question use Microsoft
SQL Server databases and IIS Web servers. She has asked you
to provide a report for her review before she schedules the
presentation.
Write a three to five (3-5) page paper in which you:
Analyze the common threats to data systems such as Web
applications and data servers. Next, speculate on the greatest
area of vulnerability and potential for damage and / or data loss
of such data systems (e.g., SQL injection, Web-based password
cracking).
Devise one (1) attack scenario where a hacker could use the
area of vulnerability that you chose in Question 1 in order to
gain access to a network or sensitive data. Examine the primary
ways in which the hacker could execute such an attack, and
suggest the strategic manner in which a security professional
could prevent the attack.
Explore the primary role that the human element could play in
adding to the attack scenario devised in Question 2. Give your
opinion on whether or not the human component is critical in
protection from that type of attack.
Use at least four (4) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, your
name, the professor’s name, the course title, and the date. The
cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Describe security concerns, tools, and techniques associated
with Web servers and Web applications.
Identify the means of hacking Web browsers.
Summarize the manner in which database servers and
applications are compromised and examine the steps that can be
taken to mitigate such risks (e.g., SQL injection).
Use technology and information resources to research issues in
ethical hacking.
Write clearly and concisely about topics related to Perimeter
Defense Techniques using proper writing mechanics and
technical style conventions.

More Related Content

Similar to Assignment 2 Web Application Attack ScenarioSuppose that you are .docx

Strayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario newStrayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario newuopassignment
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectioncoursesexams1
 
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docxAssignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docxastonrenna
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxsimba35
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperaagnaa
 
Part AFor this assignment, you must compare different tools and.docx
Part AFor this assignment, you must compare different tools and.docxPart AFor this assignment, you must compare different tools and.docx
Part AFor this assignment, you must compare different tools and.docxrandyburney60861
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperolivergeorg
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperuopassignment
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comMcdonaldRyan139
 

Similar to Assignment 2 Web Application Attack ScenarioSuppose that you are .docx (10)

Strayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario newStrayer sec 420 week 9 web application attack scenario new
Strayer sec 420 week 9 web application attack scenario new
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protection
 
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docxAssignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
 
Part AFor this assignment, you must compare different tools and.docx
Part AFor this assignment, you must compare different tools and.docxPart AFor this assignment, you must compare different tools and.docx
Part AFor this assignment, you must compare different tools and.docx
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
 

More from MatthewTennant613

Assignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxAssignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxMatthewTennant613
 
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxAssignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxMatthewTennant613
 
ASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxMatthewTennant613
 
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxAssignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxMatthewTennant613
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxMatthewTennant613
 
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxAssignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxMatthewTennant613
 
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxAssignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxMatthewTennant613
 
Assignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxAssignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxMatthewTennant613
 
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxAssignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxMatthewTennant613
 
Assignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxAssignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxMatthewTennant613
 
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxAssignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxMatthewTennant613
 
Assignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxAssignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxMatthewTennant613
 
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxAssignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxMatthewTennant613
 
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxAssignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxMatthewTennant613
 
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxAssignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxMatthewTennant613
 
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxAssignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxMatthewTennant613
 
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxAssignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxMatthewTennant613
 
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxAssignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxMatthewTennant613
 
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxAssignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxMatthewTennant613
 
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxAssignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxMatthewTennant613
 

More from MatthewTennant613 (20)

Assignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxAssignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docx
 
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxAssignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
 
ASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docx
 
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxAssignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
 
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxAssignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
 
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxAssignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
 
Assignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxAssignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docx
 
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxAssignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
 
Assignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxAssignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docx
 
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxAssignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
 
Assignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxAssignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docx
 
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxAssignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
 
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxAssignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
 
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxAssignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
 
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxAssignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
 
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxAssignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
 
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxAssignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
 
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxAssignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
 
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxAssignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Assignment 2 Web Application Attack ScenarioSuppose that you are .docx

  • 1. Assignment 2: Web Application Attack Scenario Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed presentation for her department regarding the most common Web application threats and the manner in which their products could compromise customer financial data. The products in question use Microsoft SQL Server databases and IIS Web servers. She has asked you to provide a report for her review before she schedules the presentation. Write a three to five (3-5) page paper in which you: Analyze the common threats to data systems such as Web applications and data servers. Next, speculate on the greatest area of vulnerability and potential for damage and / or data loss of such data systems (e.g., SQL injection, Web-based password cracking). Devise one (1) attack scenario where a hacker could use the area of vulnerability that you chose in Question 1 in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack. Explore the primary role that the human element could play in adding to the attack scenario devised in Question 2. Give your opinion on whether or not the human component is critical in protection from that type of attack. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • 2. Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe security concerns, tools, and techniques associated with Web servers and Web applications. Identify the means of hacking Web browsers. Summarize the manner in which database servers and applications are compromised and examine the steps that can be taken to mitigate such risks (e.g., SQL injection). Use technology and information resources to research issues in ethical hacking. Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.