Preview

Is335010 Assessment Worksheet

Good Essays
Open Document
Open Document
575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is335010 Assessment Worksheet
Lab #5 – Assessment Worksheet
Attacking a Vulnerable Web Application and Database
Course Name and Number: IA5010
Student Name: Taranjit Saini
Instructor Name: Paul Burke
Lab Due Date: March 1st, 2015
Lab Assessment Questions & Answers
1. Why is it critical to perform a penetration test on a Web application and a Web server prior to production implementation?
Penetration testing, on Web applications and Web servers is a critical step in ensuring the confidentiality, integrity, and availability (CIA) of the Web application or service. If e-commerce or privacy data is entered into the Web application, the company is bound by compliance laws and standards to ensure the confidentiality of customer data. It is especially critical when the Web application requires customers to input private data.
2. What is a cross-site scripting attack?
…show more content…
The goal of an XSS attack is to gain administrator or some other elevated level of user privileges.
3. What is a reflective cross-site scripting attack?
A reflective cross-site scripting attack is a non-persistent attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.
4. Based on the tests you performed in this lab, which Web application attack is more likely to extract privacy data elements out of a database?
SQL Injection Attack
5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases?
Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2670 Week2 Research 3

    • 752 Words
    • 3 Pages

    Server Side Includes (SSI) SSI (Server Side Includes) are directives that are placed in HTML pages, and evaluated on the server while the pages are being served. They let you add dynamically generated content to an existing HTML page, without having to serve the entire page via a CGI program, or other dynamic technology.…

    • 752 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    [Company] has been contracted to conduct a penetration test against [Organization] external web presence. The…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    1. Has IT professionals use every precaution to prevent given out any access to passwords, personnel identifications or other sensitive information to can be used in the database systems.…

    • 1251 Words
    • 6 Pages
    Good Essays
  • Good Essays

    SQL Injection Attacks

    • 575 Words
    • 3 Pages

    The MJD electronics board has inquired into database security and would like to have more information on what would be the best methods for the company to implement. As the chief security and compliance officer, I have investigated several different threats and in the following I will explain these threats and what can be done to prevent them.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sql Injection

    • 2336 Words
    • 7 Pages

    Malicious SQL statements can be introduced into a unsaved application using many different input mechanisms. The most common mechanisms are:…

    • 2336 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Overall the company is recommended to enhance their DBMS and also to use strong and reliable security measures to keep their network safe…

    • 2325 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Relational databases come with a plethora of security options and views can be enforced to ensure that unauthorized access to the sensitive information in the database is not allowed.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Executive Summary

    • 602 Words
    • 3 Pages

    Businesses are placing higher demands on database administrators. With the popularity of application integration, the internet, and the need for improved business security. The regulatory commissions have increased the need for skilled personnel in developing, creating, managing, testing, securing, and backing up databases.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Web Server Administration

    • 2959 Words
    • 12 Pages

    In the last decade the World Wide Web has become one of the most prevalent things in our modern society. The amount of traffic traveling over the web every day is staggering. Each and every one of us probably use the web daily for communication, research, and fun, but the vast majority have no idea how it all works. This paper will describe one of the most important aspects of the web server, the design and implementation of a web server and how a web server works. That is, after all, the basic idea of the web server.…

    • 2959 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    4. Crucial paradigm (2003), Hacking attacks-How and Why [online], Crucial paradigm. Available from: http://www.crucialparadigm.com/resources/tutorials/website-web-page-site-optimization/hacking-attacks-how-and-why.php [Accessed 7th December 2004].…

    • 1932 Words
    • 8 Pages
    Powerful Essays