SEC420 Strayer University Recommendation for Mitigation Essay

User Generated

jurerjnyqb187

Computer Science

SEC420

Strayer University

Description

which threats and/or vulnerabilities the company should focus on and your recommendation for mitigation

Unformatted Attachment Preview

Suppose that you are currently employed as an Information Security Manager for a mediumsized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed analytical report for her department regarding the most common web application threats and the manner in which their products could compromise customer financial data. She wants your recommendations on which threats and/or vulnerabilities the company should focus on and your recommendation for mitigation. The products in question use Microsoft SQL Server databases and IIS Web servers. Write a paper with no less than four pages in which you: 1. Analyze the common threats/vulnerabilities to data systems such as web applications and data servers. Speculate on the greatest area of vulnerability and potential for damage and/or data loss of such data systems. 2. Devise at least one attack scenario, as an example, where a hacker could use the area of vulnerability that you chose above in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack. 3. Draw specific lessons and recommendations as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft. 4. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: IT SECURITY ESSAY

1

IT Security Essay
Name
Institutional Affiliation
Date

IT SECURITY ESSAY

The benefits of most of these web applications that are used in organizations are quite a lot. It is
through these applications that work has been made easier and they have many organizations
from the strenuous work that was there before. For instance, through these websites, it is very
easy for companies such as the one being employed in (in this context) to update their portfolio
as well as other information regarding the company. Through the same website, companies can
place the advertisements and get the goals that they aimed at achieved without necessarily having
to undergo a lot of costs or rather expense (Lal, Taleb, & Dutta, 2017). Again, there is the option
of computer viruses being introduced to the applications which may end up causing
malfunctioning of the organization and cause unnecessary delays and breaking down which is
definitely not good to the organization as each organization aims at maximizing on efficiency. In
most cases, these viruses end up messing the entire application/server and making sure that it
does not work anymore hence causing losses.
The threats/vulnerabilities
There are a lot of threats that these applications are facing. For instance; there is the issue of
misconfiguration of the security. Security misconfiguration refers to the unauthorized access to
the servers of any given organization or even private entry files. In this case, in the event that
someone manages to access the portal of the organization for malicious purposes, there is a lot of
damage they could cause to the organization (Papp, Ma, & Buttyan, 201...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags