By
BARRY S KREMBS II
February 2013
Certification Statement
Title of Assignment: Identify Risks, Threats, and Vulnerabilities of Social Networks and Web Applications
CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper/project and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper.
I have also cited any sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper/project was prepared by me specifically for this course.
Student Signature (electronic) Barry S Krembs II
ABSTRACT While Social Media and Web Services …show more content…
Hackers formulate different variations of Malware to take advantage of these areas before the Developers can patch and protect against these vulnerabilities (Wikipedia, 2013). Oracle’s Java is an example of an application that is vulnerable. Their latest patch JAVA 7 Update 11 is in place to prevent up to fifty of these vulnerabilities as it just recently experienced some of these exploits. Many users are disabling this application in a Browser setting, likening it to “Kissing a black rat, in London, during the plague.” As stated in the Inquirer (Neal, …show more content…
These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).
E-Mail Takeover Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).