Website Security and Vulnerability Assessment

User Generated

qvfthvfr

Programming

Description

As a security architect, write a paper that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.

  • What is the difference between software testing and website vulnerability and security assessments?
  • How would you perform a website vulnerability and security assessment?
  • How can you use planned attacks to identify vulnerabilities?
  • How can you spot vulnerabilities in back-end systems and Structured Query Language (SQL) databases?
  • How would you prepare a vulnerability and security assessment report?

Deliverables:

  • Your paper should be 2-3 pages in length, not including the title and reference pages.
  • You must include a minimum of two (2) credible sources and information from the textbook to support your writing.
  • Your paper must follow University academic writing standards and APA style guidelines, as appropriate.
  • You are strongly encouraged to submit all assignments to the Turnitin Originality Check.


    Textbook:
    Harwood, M. (2016). Internet security: How to defend against attackers on the web (2nd ed.). Burlington, MA: Jones & Bartlett Learning. ISBN-13: 9781284090550

Unformatted Attachment Preview

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: WEBSITE VULNERABILITY

Website Vulnerability
Name
Course
Tutor
Date

1

WEBSITE VULNERABILITY

What is the difference between software testing and website vulnerability and security
assessments?

Software testing is a process of verifying the quality of a software program with the aim
of finding software bugs, errors or defects to facilitate repair in regards to the stipulated
requirements. This testing is conducted to check whether it satisfies the needs, expectations, and
requirements of the customer. Website Vulnerability is a weakness in a web application or
website that allows a threat actor or attacker to get control of the site and perform unauthorized
activities on the computer system. A security assessment is usually carried out to identify the
existing security position of an organization or information systems to provide the
recommendation for repair and upgrading to allow the organization to attain a security goal
(Broad, 2013).

How would you perform a website vulnerability and security assessment?

Carrying out website vulnerability involves some steps which are;

Reconnaissan...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags