Access over 35 million academic & study documents

Powerpoint Presentation

Content type
User Generated
Subject
Computer Science
School
Nova Academy of Cosmetology
Type
Homework
Rating
Showing Page:
1/7

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
COVERPAGE WEB VULNERABILITY Name Institution Affiliation Course Name Instructor Date INTRODUCTION • • • • • Web vulnerability is a weakness or misconfiguration in a website Similarly, it can imply code that allows; Attacker to gain some level of control of the site or;Hosting server Most web vulnerabilities occurs through automated means, such as vulnerability scanners and botnets • When such vulnerabilities occur, they cause ➢ Data loss (Breach) ➢ Hacking VULNERABILTIES • The chosen three vulnerabilities are; 1. Injection Flaws 2. Cross site scripting 3. Security misconfiguration Injection Flaws ❖ Occurs from a classic failure to filter untrusted input ❖ Thus, unfiltered data is passed into servers (Kalman) Cross site scripting ❖ Occurs due to widespread input sanitization failure VULNERABILITIES Cross site scripting ❖ Occurs due to widespread input sanitization failure ❖ An attacker gives your web application JavaScript tags on input ❖ Failure to give proper sanitation users browser will execute it Example: Crafting a link and persuading user to click on it Security misconfiguration ❖ Defined as failure to implement all the security controls for a server or web application and; ❖ Implementing the security controls, but doing so with errors (Khalid et al., 2018). WHY THESE WERE CHOSEN • This web vulnerabilities were chosen because; • They are easy to control but are always difficult to identify • Accounts for the top 10 we ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents