Security Assessment

User Generated

fzneg_pbqr

Computer Science

Description

You are the Information Security manager in a medium-sized retail organization based in Dubai. The overwhelming majority of your clients flies or drives to Dubai over the weekend to pick up the purchases they made online during the week.

You have been asked to assess the company’s current security posture and come up with a recommendation for securing against website risks, threats, and vulnerabilities.

Directions:
Write a paper that includes the following:

  • A description of 3 major risks, 3 threats, and 3 vulnerabilities that are of concern from the IT security point of view.
  • An explanation of the best practices you would recommend to mitigate these risks, threats, and vulnerabilities.

Keep in mind, we are most interested in your ability to describe the risks, threats, and vulnerabilities in the retail industry in accordance with security goals. Use diagrams, where appropriate.

Deliverables:

  • Your paper should be 2-3 pages in length, not including the title and reference pages.
  • You must include a minimum of two (2) credible sources a your writing. if possible journals
  • Your paper must follow academic writing standards and APA style guidelines, as appropriate.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, here is they work. Kindly inform me in case of anything

Running header: Website risks, threats and vulnerability

Website risks, threats and vulnerability
Student’s name
Institution
Professor’s name
Date

1

Website risks, threats and vulnerability

2

Most small retail businesses tend to ignore the importance of securing a website. It is
however very important that the website used in the business is secured properly since the
website has a vulnerability that can be exploited by a malicious person like hackers and former
fired employees.
Website security risks
Risks are the likelihood of something bad happening
i.

Injection flaws- The most popular injection flaw is the SQL injection flaw. Injection
flaws invade the data in a web application. The injection can either delete the data or
access very sensitive information. This may lead to leakage of information such as where
the next package is to be picked. This attack can also give the web application
unauthorized instructions.
Mitigation- To mitigate this type of risk businesses should incorporate an input
validation and a robust coding technique. The principle of least privilege should also be
implemented to reduce authorizations and user actions.

ii.

DDoS attack – This the most common type of risk faci...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags