Preview

Web Server Application Attacks

Powerful Essays
Open Document
Open Document
1656 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Server Application Attacks
Running Head: Web Server Application Attacks

Web Server Application Attacks

Assignment # 1

Mariz Cebron

Common web application vulnerabilities and attacks, and recommend mitigation strategies The World Wide Web has evolved into a critical delivery pipeline for institutions to interact with customers, partners and employees. Via browsers, people use web sites to send and receive information via Hypertext Markup Language (HTML) messages to web applications housed on web servers. This information, expected as legitimate messages, can be used illegitimately in unauthorized ways to compromise security vulnerabilities a.) Authentication - one of the biggest web application weaknesses is the failure to provide a means of strong authentication to verify the end user is whom he/she claims. Prior to accessing a web application, a server may require the end user to authenticate him/herself to identify the user or determine the user's access privileges. To mitigate these risks; employ strong authentication, such as HTTPS, with encrypted credentials, require authentication at specified time intervals or movement between web pages, regularly test authentication and implement authorization. b.) SQL injection - Many web applications do not properly strip user input of unnecessary special characters or validate information contained in a web request before using that input directly in SQL queries. SQL injection is an attack technique that takes advantage of the web application to extract or alter information from the database. Hackers enter SQL queries or characters into the web application to execute an unexpected action that can then act in a malicious way. Such queries can result in access to unauthorized data, bypassing of authentication or the shutting down of a database, regardless of whether the database resides on the web server or a separate server. To mitigate these risks; Ensure



Bibliography: Hall, J. (2012). Mcgladrey risk advisory. Retrieved October 17, 2012 from http://mcgladrey.com/Risk-Advisory-Services/The-UltraSecure-Network-Architecture Headlines. (2012, 0522). Anonymous claims department of justice hack, data dump. Retrieved from http://anonnews.org/press/item/1521/ Information Security: Recent Attacks on Federal Web Sites Underscore Need for Stronger Information Security Management: T-AIMD-99-223. (1999). GAO Reports, 1. Kennedy, S. (2005). Common web application vulnerabilities. Retrieved October 17, 2012 from http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Pages/Common-Web- Application-Vulnerabilities1.aspx[->2] Tian, Z. (2006). Defending against distributed denial-of -service attacks . DOI: Web Intelligence & Agent Systems; Sep2006, Vol. 4 Issue 3, p341-351, 11p, 3 Diagrams, 1 Chart, 4 Graphs Williams, A. (2007, Novemeber 1). Catering to Illegals. New York Amsterdam News, pp 13,13. Retrieved February 15, 2008, from Academic Search Premier database [->0] - http://www.justice.gov [->1] - http://www.megaupload.com [->2] - http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Pages/Common-Web-

You May Also Find These Documents Helpful

  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Web-based attacks are on the front lines of Internet security. The trending threats are as followed in rank:…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Attention requires an intensive focusing of web security efforts and money the most significant threats along with the common vulnerabilities exploited. Sensitive attribute inference through machine learning algorithms it is possible to infer sensitive data from one user. Collecting data from user’s contacts and experimented attacker can predict some not explicit data. For example, if all the friends of one user belong to one political party, it is safe to predict that the user has the same political tendencies. Excessive exposition of private data inadequate privacy configuration settings may lead to publishing sensitive information.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Web security means to keep your information in your control. In other words, cannot gain access to it by anyone else without your permission. The most people want to preserve the privacy of sensitive their information such as passwords and credit card information and the inability of others to access. The goal of the process of protection is to reduce the number of threats that harm the network. In this essay I will high light many points which are: the goals essential to the security of web CIA model, the classified types of threats and attacks, hacker web page and how to hacker by the virus, and firewall.…

    • 898 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab #1: Evaluate Business World Transformation- Impact of the Internet and WWW Learning Objectives and Outcomes.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    OWASP

    • 5288 Words
    • 22 Pages

    O About OWASP Foreword About OWASP Insecure software is already undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our digital infrastructure gets increasingly complex and interconnected, the difficulty of achieving application security increases exponentially. We can no longer afford to tolerate relatively simple security problems like those presented in the OWASP Top 10. The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.…

    • 5288 Words
    • 22 Pages
    Good Essays
  • Powerful Essays

    Mobile Database

    • 2490 Words
    • 10 Pages

    4. Technique to Secure database 4.1 Data Synchronization 4.2 Mobile transaction 4.3 Embedded database 4.4 Authentication from the Web Server 4.5 Data Privacy 4.6 Adaptability to Middleware 4.7 Communication 4.8 Data Encryption at client side…

    • 2490 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    DDoS Attack

    • 270 Words
    • 2 Pages

    A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.…

    • 270 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Authentication Technique” is to detect and prevent SQLInjection Attacks in database the deployment of this technique is…

    • 5638 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    According to the Open Web Application Security Project, credential stuffing is an emerging threat. It is one of the most common attacks on web and mobile applications, and is capable of breaching sites that do not have what are considered to be traditional security vulnerabilities. These attacks put at risk consumers, who are the compromised account owners, and organizations, which are the web application…

    • 821 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Security

    • 502 Words
    • 3 Pages

    1. Executive Summary: The NSC has tasked us to assess the potential risks associated with the United States government expanding their abilities of monitoring Internet traffic to protect all U.S. citizens, and Cyberspace as it has been deemed a vital infrastructure to the U.S. economy. Based on the all reviewed information we believe it is necessary to raise security measures in order to protect all citizens. Every business in the world is connected to the internet in some way, which makes for an interesting threat. Major shopping sites including EBay, Amazon, Best Buy and many others allow purchases that require the consumers to input their address, name and credit card information. Hackers have been successful in retrieving this information many times, some in which were never reported to consumers. It is impossible to test these types of website because companies consider their security policies as confidential.1Also web pages actually collect personal information including ISP addresses which already takes away the anonymity of online surfing. Which brings us to the current dilemma should the government increase surveillance and take away the general public’s privacy online. We believe that most citizens will be unhappy with the new requirements but will understand that it is necessary to ensure their information and the government’s information will remain safe. (xxxxxx).The government has already started to make these types of changes with their federal networks with the invention of EINSTEIN 1 and 2 which are intrusion detectors.2 These programs used We believe that an increase in surveillance is necessary…

    • 502 Words
    • 3 Pages
    Good Essays