1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
13

There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita

ble than application code or as readily available as the network perimeter. There are many ways that these areas are exploited. The application side has its beginning with code which is poorly designed from a security perspective. One of the code items that is exploited by fraudsters to pivot across an organization's internal network is the Web.cfg file - in this file non security minded programmers often leave the User ID and password for connecting to the associated database in plaintext.
For part one of this assignment, write a 1 page summary that explains to a non IT person what this attack is, how it works and how to prevent it.
The second part of this assignment is about the secure perimeter. Using your choice of reference for securing a network (NIST, Rainbow Series Red Book, Common Criteria etc.) research on how to design a secure network perimeter that will protect the internal applications, even poorly written ones like the one above from being exploited. Include a diagram of your solution and on the bottom half - a written explanation, in APA format, of your solution.
Computers and Technology
1 answer:
Zepler [3.9K]3 years ago
3 0

AnsweR

RRR

Explanation:

You might be interested in
You have been hired by an educational software company to create a program that automatically calculates the sum of each place-v
Vinvika [58]

Hi, you haven't provided the programing language, therefore, we will use python but you can extend it to any programing language by reading the code and the explanation.

Answer:

n1 = int(input("First numeber: "))

n2 = int(input("Second numeber: "))

for i in range(5):

   r1 = n1%10

   r2 = n2%10

   print(r1+r2)

   n1 = n1//10

   n2 = n2//10

 

Explanation:

  1. First, we ask for the user input n1 and n2
  2. We create a for-loop to calculate the sum of each place-value of two numbers
  3. We obtain the last number in n1 by using the mod operator (%) an the number ten this way we can always take the last value, we make the same for n2
  4. Then we print the result of adding the last two numbers (place value)
  5. Finally, we get rid of the last value and overwrite n1 and n2 to continue with the process

4 0
3 years ago
One of the most notable impacts of IT on business is improved
Igoryamba

One of the most notable impacts of IT on business is improved efficiency  of security communication.

<h3>What is security communication?</h3>

Security Communication Systems are said to be a vital aspect or part of works as well as in security mitigation measure.

The use of security communication in any organization is known to be the use of security tools to be able to keep the organization safe from any form of attack.

Note that One of the most notable impacts of IT on business is improved efficiency  of security communication as it boast security of data.

Learn more about security communication  from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
You are the manager and an employee shows up for his shift dressed inappropriately for work. What should you do?
yarga [219]

Most managers see inappropriate dressing every day. Some are left angered while some are confused as to what is the right way to approach such situations. What follows next needs to be professional oriented. Being the manager, I would start by finding out what the appropriate dressing policies are. Some companies might have dress code policies while others might not. Assuming that this company has, I would read these policies carefully. The next thing that is required from me is to have a small conversation with the employee discretely. As professional as I can be, I will mention how I feel his or her dress code is inappropriate and try to summon the employee by asking him or her whether they are fully aware of the appropriate dress code. I will try to agree with the employee on what is appropriate and what is not. If we agree, requesting the employee to home and change clothes is unnecessary, but if the need to do that arises, I would consider that to be an option.

7 0
3 years ago
Read 2 more answers
To get a sense of your digital footprint, you should:
Serggg [28]
Google yourself once a year.
4 0
3 years ago
Read 2 more answers
Choose all of the items that represent functions of the operating system kernel.
babunello [35]

Answer: its all of them

Explanation: I took Assignment over this

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • Write a one-line program to output the following haiku.
    11·2 answers
  • Debuted by the Lumiere Brothers, a hand cranked device that showed moving pictures to an audience​
    7·1 answer
  • In JavaScript, which of the statements below can be used for string declaration?
    11·1 answer
  • When command is transferred, the process should include a(n): A. Detailed Lesson Learned Report B. Intelligence Report C. Award
    11·2 answers
  • Consider the following code segment.
    12·1 answer
  • Please help ASAP, will mark brainliest!
    7·1 answer
  • How does inertia affect a person who is not wearing a seatbelt during a collision
    8·1 answer
  • Fix the two words that are used incorrectly.
    10·2 answers
  • 22. The Disc Drive is also known as the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!