Preview

Risk of Insecure System

Good Essays
Open Document
Open Document
378 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk of Insecure System
Risks of insecure systems

There are basically three overlapping types of risk that we need to worry about on systems connected to the Internet:
Bugs or misconfiguration problems in the Web server that allow unauthorized remote users to:

Steal confidential documents not intended for their eyes.
Execute commands on the server host machine, allowing them to modify the system.
Gain information about the Web server's host machine that will allow them to break into the system.
Launch denial-of-service attacks, rendering the machine temporarily unusable.
Browser-side risks, including:

Active content that crashes the browser, damages the user's system, breaches the user's privacy, or merely creates an annoyance.
The misuse of personal information knowingly or unknowingly provided by the end-user.

e.g. Identity theft or Session hijacking
Interception of network data sent between browser and server via eavesdropping. Eavesdroppers operate from any point on the path between browser and server:

The network on the browser's side of the connection.
The network on the server's side of the connection (including intranets).
The client or server's Internet service provider (ISP).
Either ISPs' regional access provider.
Some of these risks every user of the internet needs to be aware of (e.g. browser side risks and the fact that traffic can be intercepted in transit to and from the server) and others are the sole responsibility of the internet provider.

As a small business owner you need to be aware of these risks and take steps to insure that your website is not vulnerable to them - or promoting them. To do this you wail want to make sure you are using a reputable hosting provider that will monitor your site for denial of service attacks and other server side problems. You will want to make sure you use SSL to encrypt all sensitive data transmission between yourself and your users. You will want to make sure any software you use on your site

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    First of all, since Linux is mostly an open-source type of software running server, it is very vulnerable to any kinds of attacks, or as Linux calls them, crackers. Many malicious attacks on Linux and related applications will also grow. The Web Server isn’t much of a risk because but it is still an important software that can have a high risk of being attacked because it’s known as an open-source, so having any personal information stored inside it, can be at risk of being exposed to a cracker (hacker).…

    • 364 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Encrypt sensitive sections of configuration files, secure settings for various operations of web services using configuration files, usage of access control lists…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Originally, Internet was designed for absolute security environment. Therefore, the protocols which are consisting of the infrastructure of Internet have no security concerns. This means Internet is easily to be vulnerable.…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Although the internet and modern technology comes with many advantages, as with everything else it also comes with risks and concerns, especially towards children and young people.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Question 3. What approach to risk management will identify threats, vulnerabilities, and the critical assets that we must protect?…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Align identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Although the internet can be a valuable tool both educationally and socially, there are some serious risks associated with using the internet and other technologies. As in the real world, children and young people are vulnerable and may knowingly or unknowingly expose themselves to danger when using the internet, mobile phones and other technologies.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays