Preview

IS3445 Project Part 4

Good Essays
Open Document
Open Document
565 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3445 Project Part 4
Introduction
The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.
Common Weaknesses, Attacks, Motivation, and Roles Involved
SQL Injection
A SQL, or sequel, Injection refers to an attacker inserting sequel coding into the user input, such as the username/password user input at the applications login screen. Doing this, the attacker would be able to gain access to the list of passwords that could be stored within the application database. That said, the attacker’s motivation would be that of gain. He would like to gain access to this application in order to scam others, steal money, or change data around to his or her liking. This is the developer’s role to ensure that SQL Injections cannot occur. The security engineer can periodically test the user inputs to ensure that the user input has a SQL checker and/or limits to what characters can and cannot be used.
Cross-site scripting
Cross-site Scripting (XSS) refers to an attack that primary targets the end users, which requires a web form that takes a user’s input, processes it, and prints it in clear text for the attacker to readily have. The attacker can then log into that account, gaining access to it. A motivation here could be to gain monetary values. It will be the system administrator’s role

You May Also Find These Documents Helpful

  • Good Essays

    SEQUEL or SQL is a data language that provides benefits for all types of users. SQL’s purpose is to provide an interface to a relational database such as Oracle Database. Dr. Edgar Frank “Ted” Codd introduced the first commercially available implementation of SQL. Today, SQL is accepted as the standard RDBMS language. The features of SQL include processing sets of data as groups rather than as individual units and providing automatic navigation to the data. It uses statements that are complex and powerful individually, and that therefore stand alone. Flow-control statements were not part of SQL originally, but they are found in the recently accepted optional part of SQL. Flow-control statements are commonly known as "persistent stored modules" (PSM), and the PL/SQL extension to Oracle SQL is similar to PSM.…

    • 452 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS4680 Lab 4 Q&A

    • 1180 Words
    • 4 Pages

    RFI stands for Remote File Inclusion that allows the attacker to upload a custom coded/malicious file on a website or server using a script. This vulnerability exploits the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript). RFI is a common vulnerability and all website hacking is not entirely focused on SQL injection. Using RFI you can deface the websites, get access to the server and do almost anything. What makes it more dangerous is that you only need to have your common sense and basic knowledge of PHP to execute this one, some BASH might come handy as most of servers today are hosted on Linux.…

    • 1180 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Best Essays

    Is535 Final Course Project

    • 3651 Words
    • 15 Pages

    The first key to starting a successful online business is to first understand ecommerce and how it operates. Most people understand that ecommerce or electronic commerce refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. However, it stretches beyond just the buying and selling of goods; it also includes an online process of developing, marketing, selling, delivering, servicing and paying for products and services. “The use of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction 's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices and telephones as well”. (Electronic Commerce, modified November 2011, Wikipedia). Today it is said to be over 29.7 billion pages on the World Wide Web. Ecommerce today has gained so much popularity because its core technologies are constantly evolving and keeping up with a technology based world. Each year the number of ecommerce deals grows tremendously. The sales volumes of on-line stores run in a more than comparable race with physical retail stores.…

    • 3651 Words
    • 15 Pages
    Best Essays
  • Good Essays

    Attention requires an intensive focusing of web security efforts and money the most significant threats along with the common vulnerabilities exploited. Sensitive attribute inference through machine learning algorithms it is possible to infer sensitive data from one user. Collecting data from user’s contacts and experimented attacker can predict some not explicit data. For example, if all the friends of one user belong to one political party, it is safe to predict that the user has the same political tendencies. Excessive exposition of private data inadequate privacy configuration settings may lead to publishing sensitive information.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Our world has changed drastically in recent years; we are living in the age of globalization and fast economic growth. Internet trading (e-commerce) has become an important part of our busy lifestyle and major part of every business sector in the world. As our lives have change the internet has changed…

    • 8462 Words
    • 34 Pages
    Good Essays
  • Better Essays

    Web Security Issues

    • 911 Words
    • 4 Pages

    This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security.…

    • 911 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Abstract Findings Summary Sector Analysis Overview by Year Average Vulnerabilities Analysis Advertising & Media Financial Services (Europe) Healthcare Insurance & Law Technology & Telecommunications UK Government Other Sectors Vulnerability Category Analysis Authentication Authorisation Encryption Information Leakage Input Validation Cross-site Scripting (XSS) Other input Server Configuration Session Management OWASP Top10 Conclusion Dataset Restrictions About Context Assurance About Context Works Cited Glossary of Terms 3 4 6 6 8 8 9 10 11 12 14 15 16 16 17 17 18 19 20 22 22 23 24 25 27 28 28 29 30…

    • 8987 Words
    • 36 Pages
    Satisfactory Essays
  • Good Essays

    Web security means to keep your information in your control. In other words, cannot gain access to it by anyone else without your permission. The most people want to preserve the privacy of sensitive their information such as passwords and credit card information and the inability of others to access. The goal of the process of protection is to reduce the number of threats that harm the network. In this essay I will high light many points which are: the goals essential to the security of web CIA model, the classified types of threats and attacks, hacker web page and how to hacker by the virus, and firewall.…

    • 898 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Web Application Security

    • 1495 Words
    • 6 Pages

    Introduction Throughout the years many aspiring programmers and many amazing web applications have surfaced. Though these applications and websites had amazing functionality and were very user-friendly they all shared one common flaw: A lack of attention to security. Due to this reason many of them were rejected by the public community or were even taken offline by malicious attackers. Due to these reasons the creation of this paper came to be. This paper will touch on many topics including: good coding practices, insecure hashing and encryption methods, SQL injections, session fixation, cross-site scripting (XSS), file inclusion, and arbitrary command injection. Please remember that while reading this PHP will be the primary language referenced, however if you use other server side languages the same concepts may still be applied. Throughout this writing it is assumed that the reader will have a basic working knowledge of PHP, HTML, Javascript, and MySQL, as well as knowledge of the basic workings of web applications (database connections, content presentation, etc). By the end of this paper you will be equipped with the knowledge of efficient coding practices which will allow you to program and develop secure applications, protected against the most widely applied techniques used by the majority of black-hat crackers and white-hat penetration testers.…

    • 1495 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Application Security

    • 2278 Words
    • 10 Pages

    Open Web Application Security Project (OWASP) and Web Application Security Consortium (WASC) updates on the latest threats which impair web based applications. This aids developers, security testers and architects to focus on better design and mitigation strategy. OWASP Top 10 has become an industrial norm in assessing Web Applications.…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    The impact of the internet over the last few years has meant fundamental changes in the way we access the information. Though the network security perimeter has crumbled at all levels, the number of users wanting network access has grown. While there are enormous productivity benefits available from increased access, the security risks have greatly increased. Growing threats to security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vital. Adams and Sasse (1999) identified the importance for security (in particular security mechanisms) of real world cues that enable users to interpret potential security risks in their interaction with sensitive information. Security threats are increasing day by day and to protect security is becoming a major concern. The different types of attacks are shown in Fig 1.…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Guide to SQL injection

    • 2874 Words
    • 12 Pages

    weaknesses in the program. The purpose of SQL injection is to convince the application to run…

    • 2874 Words
    • 12 Pages
    Good Essays
  • Better Essays

    While Facebook users share a wide range of information, a lot of people show their concerns about user privacy. Kathy Kristof (2011) stated that users make Facebook so treacherous. Further she explained that the crooks can get the name, age, birthday, address and other basic information of end-users directly from their website and such information increases the chances of cracking bank accounts of users and other important accounts. Another concern posted by SOPHOS (2011) demonstrates many different methods of Facebook scams such as Self-XSS, click jacking and survey scams. All of these ways are trying to trick users into cutting and pasting a malicious JavaScript code into their browser’s address bar. In addition, Linda McGlasson (2011) listed top 9 security threats in which Social…

    • 988 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Web applications need to be designed with security in mind. A step-by-step guideline allows the developer to keep important security topics in mind. Testing and getting results then testing again to get more results allows us to see if there is consistency or if there is changes. Vulnerability studies have shown that with the reaction time of attackers worldwide, the typical window of vulnerability does not provide enough time for patch installation, since the time between a vulnerability being uncovered and an automated attack against it being developed and released is decreasing every year.…

    • 803 Words
    • 4 Pages
    Good Essays