Preview

Project Part 4 Web Application Vulnerabilities and Motivations for Attack

Satisfactory Essays
Open Document
Open Document
258 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Part 4 Web Application Vulnerabilities and Motivations for Attack
Project Part 4: Web Application Vulnerabilities and Motivations for Attack

Scenario
UNFO traditionally has been a brick-and-mortar retailer, and the management has experiences of associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be your role to summarize the business impact of these new risks, the motivating factors that one may have to exploit vulnerabilities, and how the risks can be mitigated.

Tasks
Prepare an executive summary report for presentation to the senior management to assist the team in understanding IT security risks associated with an e-commerce model. Additionally, the senior management team will need to use the report as guidance for determining a budget allocation for hiring new IT professionals. Through the given scenario of UNFO, identify the weaknesses and vulnerabilities associated with the proposed Web platform. To do so, you must:
1. Research and classify common weaknesses and attacks associated with e-commerce and social networking applications.
2. Identify the motivation for potential attacks.
3. Identify the roles such as System administrator, developer, security engineer, and quality assurance analyst for each classification.
4. Explain the business impacts of a successful exploit on a Web application’s weakness.

Summarize the importance of identifying weaknesses and motivation for attacks early in the development or implementation process.

Deliverables and format:
Submit your answer in a Microsoft Word document in not more than two pages.
Font: Arial 10 point size
Line Spacing: Double

You May Also Find These Documents Helpful

  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    6. Perform SQL injection attacks against sample vulnerable Web applications with e-commerce data 
entry fields…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Some risks that I have identified are social engineering techniques due to the excessive trust given to messages coming from friends, contacts or followed people within the OSN(Online-Social Network) identity theft and information leaking furthermore, spam sending and malware distribution through Social Networks are increasing at an incredible pace. They are not the only threats.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 12

    • 6979 Words
    • 28 Pages

    I will then prepare a presentation that describes the kinds of actions that various organisations take to reduce security risks from operating online. I will then explain the competitivepressures on selected contrasting businesses organisations to develop their use of e-business. I will then take two contrasting businesses and explain using examples, how they have responded to competitive forces to develop their use of e-business. I will then be evaluating how successful a particular business organisation has been preparing for the growing use of e-business. I will finally prepare an outline personal development plan for sales staff that is unfamiliar with internet business.…

    • 6979 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    [Us as] security professional need to be aware of common attack methods so that they can take proactive steps to prevent attacks [by recognizing] them when they occur and respond [to them] appropriately (James M. Stewart, p. 48).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Good Essays

    E-commerce has many drawbacks. I will be going through these drawbacks that risk an organisation of committing to an E-commerce system.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays