Preview

Web Server Application Attacks

Powerful Essays
Open Document
Open Document
1656 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Server Application Attacks
Running Head: Web Server Application Attacks

Web Server Application Attacks

Assignment # 1

Mariz Cebron

Common web application vulnerabilities and attacks, and recommend mitigation strategies The World Wide Web has evolved into a critical delivery pipeline for institutions to interact with customers, partners and employees. Via browsers, people use web sites to send and receive information via Hypertext Markup Language (HTML) messages to web applications housed on web servers. This information, expected as legitimate messages, can be used illegitimately in unauthorized ways to compromise security vulnerabilities a.) Authentication - one of the biggest web application weaknesses is the failure to provide a means of strong authentication to verify the end user is whom he/she claims. Prior to accessing a web application, a server may require the end user to authenticate him/herself to identify the user or determine the user's access privileges. To mitigate these risks; employ strong authentication, such as HTTPS, with encrypted credentials, require authentication at specified time intervals or movement between web pages, regularly test authentication and implement authorization. b.) SQL injection - Many web applications do not properly strip user input of unnecessary special characters or validate information contained in a web request before using that input directly in SQL queries. SQL injection is an attack technique that takes advantage of the web application to extract or alter information from the database. Hackers enter SQL queries or characters into the web application to execute an unexpected action that can then act in a malicious way. Such queries can result in access to unauthorized data, bypassing of authentication or the shutting down of a database, regardless of whether the database resides on the web server or a separate server. To mitigate these risks; Ensure



Bibliography: Hall, J. (2012). Mcgladrey risk advisory. Retrieved October 17, 2012 from http://mcgladrey.com/Risk-Advisory-Services/The-UltraSecure-Network-Architecture Headlines. (2012, 0522). Anonymous claims department of justice hack, data dump. Retrieved from http://anonnews.org/press/item/1521/ Information Security: Recent Attacks on Federal Web Sites Underscore Need for Stronger Information Security Management: T-AIMD-99-223. (1999). GAO Reports, 1. Kennedy, S. (2005). Common web application vulnerabilities. Retrieved October 17, 2012 from http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Pages/Common-Web- Application-Vulnerabilities1.aspx[->2] Tian, Z. (2006). Defending against distributed denial-of -service attacks . DOI: Web Intelligence & Agent Systems; Sep2006, Vol. 4 Issue 3, p341-351, 11p, 3 Diagrams, 1 Chart, 4 Graphs Williams, A. (2007, Novemeber 1). Catering to Illegals. New York Amsterdam News, pp 13,13. Retrieved February 15, 2008, from Academic Search Premier database [->0] - http://www.justice.gov [->1] - http://www.megaupload.com [->2] - http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Pages/Common-Web-

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Web applications on application server ensures universal access, as every modern computer, laptop, tablet has a browser.…

    • 776 Words
    • 4 Pages
    Good Essays
  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    A SQL, or sequel, Injection refers to an attacker inserting sequel coding into the user input, such as the username/password user input at the applications login screen. Doing this, the attacker would be able to gain access to the list of passwords that could be stored within the application database. That said, the attacker’s motivation would be that of gain. He would like to gain access to this application in order to scam others, steal money, or change data around to his or her liking. This is the developer’s role to ensure that SQL Injections cannot occur. The security engineer can periodically test the user inputs to ensure that the user input has a SQL checker and/or limits to what characters can and cannot be used.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Attention requires an intensive focusing of web security efforts and money the most significant threats along with the common vulnerabilities exploited. Sensitive attribute inference through machine learning algorithms it is possible to infer sensitive data from one user. Collecting data from user’s contacts and experimented attacker can predict some not explicit data. For example, if all the friends of one user belong to one political party, it is safe to predict that the user has the same political tendencies. Excessive exposition of private data inadequate privacy configuration settings may lead to publishing sensitive information.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab #1: Evaluate Business World Transformation- Impact of the Internet and WWW Learning Objectives and Outcomes.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    OWASP

    • 5288 Words
    • 22 Pages

    O About OWASP Foreword About OWASP Insecure software is already undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our digital infrastructure gets increasingly complex and interconnected, the difficulty of achieving application security increases exponentially. We can no longer afford to tolerate relatively simple security problems like those presented in the OWASP Top 10. The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.…

    • 5288 Words
    • 22 Pages
    Good Essays
  • Good Essays

    There are three goals essential to the security of web CIA model. First model is confidentiality is better translation what is confidential information. Confidential information in the sense that no unauthorized person reading this information. For example, if someone is able to what tapping up the process by an attack of the type of man in the Middle cannot take advantage of this data. The most important thing with any bank is Confidentiality, torn him the information in databases or in transit in a very serious network if the threat of confidential information. Secondly model is integrity and this component meaning is to make sure that the data has not been tampered with or modified while passing on…

    • 898 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Authentication Technique” is to detect and prevent SQLInjection Attacks in database the deployment of this technique is…

    • 5638 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Mobile Database

    • 2490 Words
    • 10 Pages

    4. Technique to Secure database 4.1 Data Synchronization 4.2 Mobile transaction 4.3 Embedded database 4.4 Authentication from the Web Server 4.5 Data Privacy 4.6 Adaptability to Middleware 4.7 Communication 4.8 Data Encryption at client side…

    • 2490 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    DDoS Attack

    • 270 Words
    • 2 Pages

    A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.…

    • 270 Words
    • 2 Pages
    Good Essays
  • Good Essays

    According to the Open Web Application Security Project, credential stuffing is an emerging threat. It is one of the most common attacks on web and mobile applications, and is capable of breaching sites that do not have what are considered to be traditional security vulnerabilities. These attacks put at risk consumers, who are the compromised account owners, and organizations, which are the web application…

    • 821 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Security

    • 502 Words
    • 3 Pages

    1. Executive Summary: The NSC has tasked us to assess the potential risks associated with the United States government expanding their abilities of monitoring Internet traffic to protect all U.S. citizens, and Cyberspace as it has been deemed a vital infrastructure to the U.S. economy. Based on the all reviewed information we believe it is necessary to raise security measures in order to protect all citizens. Every business in the world is connected to the internet in some way, which makes for an interesting threat. Major shopping sites including EBay, Amazon, Best Buy and many others allow purchases that require the consumers to input their address, name and credit card information. Hackers have been successful in retrieving this information many times, some in which were never reported to consumers. It is impossible to test these types of website because companies consider their security policies as confidential.1Also web pages actually collect personal information including ISP addresses which already takes away the anonymity of online surfing. Which brings us to the current dilemma should the government increase surveillance and take away the general public’s privacy online. We believe that most citizens will be unhappy with the new requirements but will understand that it is necessary to ensure their information and the government’s information will remain safe. (xxxxxx).The government has already started to make these types of changes with their federal networks with the invention of EINSTEIN 1 and 2 which are intrusion detectors.2 These programs used We believe that an increase in surveillance is necessary…

    • 502 Words
    • 3 Pages
    Good Essays