Thursday, July 18, 2019

Web application and a Web server

1. Why is it little to perform a incursion seek on a web practical screening and a weather vane server front to production implementation? Although many organizations entertain reduce significant number of target and coding defects through softw atomic number 18 learning lifecycle there still remains credential holes that arise when an application is deployed and interacts with another(prenominal)(a) processes and un wish well operating systems (Cobb, 2014). Another reason that penetration test is critical is many stip abrogate Card Industry Data certificate Standard (PCI DSS) mandate internal and bug out-of-door penetration test (Cobb,2014).2. What is a cross-site helping handing plan of eruption? Explain in your own words. Cross-site handing is when an assaulter exploits the controls of a trusted website and injects poisonous enrol with the intent of spreading it to other end exploiters. For example, an snipeer injects a browser script on a website, so tha t other users will click on it and via media sensitive info.3. What is a reflective cross-site scripting attack?A reflective cross-site scripting attack is when the injected script is reflected off the web server, much like an error message or appear results. This type of attack is mostly carried out by e-mail messages in which the user is tricked by clicking on a malicious link and then the injected code travels to the assailable website and reflects the attack back to the users browser (OWASP, 2013).4. What common method of bewilderment is used in most real-world SQL attacks? These methods complicate character scrambling, repeating character masking, numeric variance, nulling, artificial data generation, truncating, encoding, and aggregating. These methods rely on an array of built in SQL server system functions that are used for pull in manipulation (Magnabosco, 2009).5. Which network application attack is more(prenominal) prone to extracting privacy data elements out of a database? SQL injections can be used to enter the database with administrator rights in which are also the best management to avoid using Java on the website (OWASP, 2013).6. If you can monitor when SQL injections are performed on an SQL database,what would you barrack as a credentials countermeasure to monitor your production SQL databases? I would recommend coordinated and regular security audits to disallow any back lash of SQL injections.7. abandoned that Apache and Internet Information Services (IIS) are the two most popular Web application servers for Linux and Microsoft Windows platforms, what would you do to find out cognise software vulnerabilities and exploits? I would explore the medium-large number of binary planting vulnerabilities know as dll spoofing and dll preloading in which have been determine in third party applications caterpillar tread on a windows platform.8. What can you do to ensure that your organization incorporates penetration exam and Web a pplication testing as part of its implementation procedures? My approach to this consequence would be to focus on the benefits of penetration testing and web application testing. I would explain to my company how the testing would identify holes and vulnerabilities in the current web applications. I would also make the point that by incorporating this testing would make the organization more marketable to partner companies and future clients.9. What other security countermeasures do you recommend for websites and Web application deployment to ensure the CIA of the Web application? I would identify all the primal pieces to my Web innkeeper and address each accordingly. The key pieces would include Patches and Updates, IISLockdown, Services, Protocols, Accounts, Files and Directions, Shares, Ports, Registry, Auditing and Logging, Sites and Virtural Directories, Script Mappings, ISAPI Filters, ISS Metabase, Server Certificates, Machine.config, and Code Access Security (Microsoft Cor poration, 2014).10. Who is creditworthy and accountable for the CIA of production Web applications and Web servers? Any trained certified information security professional that is assigned or assumes such responsibility.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.